vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:02 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch05/162-166.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/153-156.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:02 -0000 vti_cacheddtm:TX|29 Jan 2009 11:51:02 -0000 vti_filesize:IR|28398 vti_cachedtitle:SR|Cryptography: Theory and Practice:The RSA System and Factoring vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|153-156.html H|../ewtoc.html H|../ch05/162-166.html S|images/04-128d.jpg S|images/04-129d.jpg S|images/04-92i.jpg S|images/04-93i.jpg S|images/04-130d.jpg S|images/04-94i.jpg S|images/04-95i.jpg S|images/04-96i.jpg S|images/04-97i.jpg S|images/04-98i.jpg S|images/04-131d.jpg S|images/04-132d.jpg S|images/04-99i.jpg S|images/04-100i.jpg H|javascript:displayWindow('images/04-16.jpg',505,101) S|images/04-16t.jpg H|javascript:displayWindow('images/04-16.jpg',505,101) S|images/04-101i.jpg S|images/04-133d.jpg S|images/04-102i.jpg S|images/04-134d.jpg S|images/04-103i.jpg S|images/04-104i.jpg S|images/04-135d.jpg S|images/04-136d.jpg S|images/04-137d.jpg S|images/04-138d.jpg S|images/04-139d.jpg S|images/04-140d.jpg S|images/04-141d.jpg H|153-156.html H|../ewtoc.html H|../ch05/162-166.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/153-156.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch05/162-166.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-128d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-129d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-92i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-93i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-130d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-94i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-95i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-96i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-97i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-98i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-131d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-132d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-99i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-100i.jpg SHUS|javascript:displayWindow('images/04-16.jpg',505,101) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-16t.jpg SHUS|javascript:displayWindow('images/04-16.jpg',505,101) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-101i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-133d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-102i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-134d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-103i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-104i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-135d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-136d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-137d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-138d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-139d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-140d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/images/04-141d.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch04/153-156.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch05/162-166.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:The RSA System and Factoring vti_lineageid:SR|{9FE76424-8482-484F-8A7C-0FBBF99403FC}