Introduction :: Cryptology
Crypto-graphy :: hiding
Symmetric Cipher
Asymmetric Cipher
Protocols
Crypt-analysis :: breaking
simple Ciphers
Substitution
Shift
Affine
Kerckhoffsβ Principle
Stream VS Block Ciphers
Stream Ciphers
Synchronous and Asynchronous
random number generator
true
pseudo
secure pseudo
One Time Pad
Computational Security
Linear Feedback Shift Registers
desc
feedback coefficient vector
Attack
Trivium
DES
Confusion and Diffusion
AES