This book focuseson protocols and constructions that make good use
of the building blocks for symmetric cryptography. The book brings
under one roof, several esoteric strategies of utilizing symmetric
cryptographic blocks. The specific topics addressed by the book
include various key distribution strategies for unicast, broadcast
and multicast security and strategies for constructing efficient
digests of dynamic databases using binary hash trees."
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!