O'Reilly logo

C# 2008 and 2005 Threaded Programming: Beginner's Guide by Gastón C. Hillar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action - Defining methods for encryption and decryption

Unfortunately, the FBI finally discovered your brute force attack. The problem was that the first version took too much time to break the code because it was single-threaded. Now, the FBI wants you to cooperate with them in an encryption project using your multithreading knowledge and as a reward, they will acquit you of all your charges.

They are working with a new cellular phone capable of sending SMS (text messages) with access to the complete Unicode character set. The cellular phone is a single core device. You have to work in a very fast and efficient encryption engine capable of encrypting the incoming text messages and leaving them in an output queue. This engine is going ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required