Information technology. Security techniques. Modes of operation for an n-bit cipher

Sign in / Sign up

Export Citation Format

Share Document