正在加载图片...
Taxonomy of cryptographic primitives Arbitrary length hash functions Unkeyed Primitives One-way permutations Random sequences Block cIphers Symmetric-key ciphers Stream aRbitrary length hash functions(MACs) cIphers Securit Primitives ymmetrIc-key Primitives Signatures Pseudorandom sequences Identification primitives Public-key ciphers Public-key Primitives Signatur Identification primitivesTaxonomy of cryptographic primitives. Arbitrary length hash functions One-way permutations Random sequences Symmetric-key ciphers Arbitrary length hash functions(MACs) Signatures Pseudorandom sequences Identification primitives Public-key ciphers Signatures Identification primitives Unkeyed Primitives Symmetric-key Primitives Public-key Primitives Security Primitives Block ciphers Stream ciphers
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有