Crypto intro Symmetric crypto Achieving security goals with symmetric crypto e-Passport example Encryption: modes of operation
Radboud University Nijmegen
Computer Security: Secret Key Crypto
- B. Jacobs
Institute for Computing and Information Sciences – Digital Security Radboud University Nijmegen
Version: fall 2015
- B. Jacobs
Version: fall 2015 Computer Security 1 / 78