Cookie Consent

Our website uses cookies to provide your browsing experience and relavent informations.Before continuing to use our website, you agree & accept of our Cookie Policy & Privacy

Whatsapp Telegram Youtube
Service

Bibliografi

    1. Biham E., Biryukov A., Dunkelman O., Richardson E., Shamir A. Indledende observationer om Skipjack: Krypteringsanalyse af Skipjack-3XOR. http://www.cs.technion.ac.il - Technion - 1998.
    2. Blaze M., Diffie W., Rivest R.L., Schneier B., Shimomura T., Thompson E., Wiener M. Minimale nøglelængder til symmetriske chiffer for at give tilstrækkelig kommerciel sikkerhed. http://www.schneier.com - januar 1996.
    3. Menezes A., van Oorschot P., Vanstone S. Handbook of Applied Cryptography. http://www.cacr.math.uwaterloo.ca .
    4. Panasenko S. Krypteringsalgoritmer - finalister i AES-konkurrencen. http://www.ixbt.com - 24/08/2006
    5. Panasenko S. Interessante krypteringsalgoritmer.
    6. Schneier B. Anvendt kryptografi.
    7. Partyka T.L., Popov I.I.
    8. Krysin A.V.
    9. Tarasyuk M.V.
    10. Lukashov I.V. Kryptografi?
    11. Panasenko S.P., Informationsbeskyttelse i computernetværk // PC World Magazine 2002 nr. 2.
    12. Bunin O. Underholdende kryptering // PC World Magazine 2003 nr. 7.
    13. Panasenko S.P., Rakitin V.V.
    14. Panasenko S.P. For at forstå kryptografers sprog // PC World Magazine.
    15. Panasenko S.P. For at forstå kryptografers sprog // PC World Magazine.

l,null,

family list tree collection families pedigree cryptographer surnames names phone secret animal genealogical app trees ancestry heritage gallery codes apple microsoft google huawei allsoft xiaomi samsung appstores screenshots amazon linux