The.Algorithm.Design.Manual.Springer-Verlag.1998

The.Algorithm.Design.Manual.Springer-Verlag.1998 The.Algorithm.Design.Manual.Springer-Verlag.1998

18.04.2013 Views

1.7.6 Cryptography 1.7.6 Cryptography INPUT OUTPUT Input Description: A plaintext message T or encrypted text E , and a key k . Problem: Encode T using k giving E , or decode E using k back to T . Implementations ● () (rating 10) ● The Stanford GraphBase (C) (rating 3) ● Netlib / TOMS -- Collected Algorithms of the ACM (FORTRAN) (rating 3) Related Problems ● Factoring and Primality Testing ● Arbitrary Precision Arithmetic file:///E|/WEBSITE/FILES2/CRYPAPHY.HTM (1 of 2) [19/1/2003 1:37:34]

1.7.6 Cryptography ● Text Compression Go to the corresponding chapter in the book About the Book Send us Mail Go to Main Page This page last modified on Tue Jun 03, 1997 . file:///E|/WEBSITE/FILES2/CRYPAPHY.HTM (2 of 2) [19/1/2003 1:37:34]

1.7.6 Cryptography<br />

● Text Compression<br />

Go to the corresponding chapter in the book<br />

About the Book<br />

Send us Mail<br />

Go to Main Page<br />

This page last modified on Tue Jun 03, 1997 .<br />

file:///E|/WEBSITE/FILES2/CRYPAPHY.HTM (2 of 2) [19/1/2003 1:37:34]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!