CRYPTOGRAPHY AND NETWORK SECURITY - SUMMARY
Ch8 Modes of operation
chapter 15
chapter10
chapter11
chapter12
chapter13
first
Modern Symmetric key ciphers
second
Substitution