vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:00 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/100-101.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/095-097.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:00 -0000 vti_cacheddtm:TX|29 Jan 2009 11:50:45 -0000 vti_filesize:IR|11956 vti_cachedtitle:SR|Cryptography: Theory and Practice:The Data Encryption Standard vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|095-097.html H|../ewtoc.html H|100-101.html S|images/03-35d.jpg S|images/03-53i.jpg S|images/03-54i.jpg S|images/03-55i.jpg S|images/03-56i.jpg S|images/03-57i.jpg S|images/03-58i.jpg S|images/03-59i.jpg S|images/03-60i.jpg S|images/03-61i.jpg S|images/03-62i.jpg S|images/03-63i.jpg S|images/03-64i.jpg S|images/03-65i.jpg S|images/03-66i.jpg S|images/03-36d.jpg H|javascript:displayWindow('images/03-10.jpg',400,35) S|images/03-10t.jpg H|javascript:displayWindow('images/03-10.jpg',400,35) H|javascript:displayWindow('images/03-11.jpg',400,34) S|images/03-11t.jpg H|javascript:displayWindow('images/03-11.jpg',400,34) S|images/03-37d.jpg S|images/03-38d.jpg S|images/03-67i.jpg S|images/03-68i.jpg S|images/03-69i.jpg S|images/03-70i.jpg S|images/03-71i.jpg S|images/03-72i.jpg S|images/03-73i.jpg S|images/03-39d.jpg H|javascript:displayWindow('images/03-12.jpg',400,67) S|images/03-12t.jpg H|javascript:displayWindow('images/03-12.jpg',400,67) S|images/03-74i.jpg S|images/03-40d.jpg H|095-097.html H|../ewtoc.html H|100-101.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/095-097.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/100-101.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-35d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-53i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-54i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-55i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-56i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-57i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-58i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-59i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-60i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-61i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-62i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-63i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-64i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-65i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-66i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-36d.jpg SHUS|javascript:displayWindow('images/03-10.jpg',400,35) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-10t.jpg SHUS|javascript:displayWindow('images/03-10.jpg',400,35) SHUS|javascript:displayWindow('images/03-11.jpg',400,34) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-11t.jpg SHUS|javascript:displayWindow('images/03-11.jpg',400,34) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-37d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-38d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-67i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-68i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-69i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-70i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-71i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-72i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-73i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-39d.jpg SHUS|javascript:displayWindow('images/03-12.jpg',400,67) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-12t.jpg SHUS|javascript:displayWindow('images/03-12.jpg',400,67) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-74i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/images/03-40d.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/095-097.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch03/100-101.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:The Data Encryption Standard vti_lineageid:SR|{1D577856-1026-497B-8318-CD1F246609C7}