Information Security.- Cryptography.- Bock Ciphers.- Stream Ciphers.- Hash Functions.- Message Authentication Codes.- Authenticated Encryption.- Post-Quantum Cryptography.- Efficient Implementations. Public key Cryptography.- Applied Cryptography.

Information Security.- Cryptography.- Bock Ciphers.- Stream Ciphers.- Hash Functions.- Message Authentication Codes.- Authenticated Encryption.- Post-Quantum Cryptography.- Efficient Implementations. Public key Cryptography.- Applied Cryptography.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
Share This Book: