A. Symmetric Techniques
A.1 | Introduction |
A.2 | Block Ciphers |
A.3 | Stream Ciphers |
A.4 | Hash Functions |
Sour, sweet, bitter, pungent, all must be tasted.
—Chinese Proverb
Unless we change direction, we are likely to end up where we are going.
—Anonymous
Not everything that can be counted counts, and not everything that counts can be counted.
—Albert Einstein
Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.