Contents in Detail
Transposition: Same Data, Different Order
Varying the Substitution Pattern
The Advanced Encryption Standard
AES Encryption: The Big Picture
The Limits of Private-Key Encryption
Transforming a Password into a Number
Properties of Good Hash Functions
Get How Software Works now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.