vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:02 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/212-215.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/220-226.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:02 -0000 vti_cacheddtm:TX|29 Jan 2009 11:51:37 -0000 vti_filesize:IR|12147 vti_cachedtitle:SR|Cryptography: Theory and Practice:Signature Schemes vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|212-215.html H|../ewtoc.html H|220-226.html S|images/06-28i.jpg H|javascript:displayWindow('images/06-05.jpg',450,331) S|images/06-05t.jpg H|javascript:displayWindow('images/06-05.jpg',450,331) S|images/06-47d.jpg S|images/06-29i.jpg S|images/06-48d.jpg S|images/06-30i.jpg S|images/06-49d.jpg H|javascript:displayWindow('images/06-06.jpg',450,254) S|images/06-06t.jpg H|javascript:displayWindow('images/06-06.jpg',450,254) H|javascript:displayWindow('images/06-07.jpg',400,354) S|images/06-07t.jpg H|javascript:displayWindow('images/06-07.jpg',400,354) S|images/06-31i.jpg S|images/06-32i.jpg S|images/06-50d.jpg S|images/06-51d.jpg S|images/06-52d.jpg S|images/06-53d.jpg S|images/06-54d.jpg S|images/06-55d.jpg S|images/06-56d.jpg S|images/06-57d.jpg S|images/06-58d.jpg S|images/06-33i.jpg S|images/06-34i.jpg S|images/06-35i.jpg S|images/06-36i.jpg S|images/06-59d.jpg S|images/06-60d.jpg S|images/06-61d.jpg S|images/06-62d.jpg H|212-215.html H|../ewtoc.html H|220-226.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/212-215.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/220-226.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-28i.jpg SHUS|javascript:displayWindow('images/06-05.jpg',450,331) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-05t.jpg SHUS|javascript:displayWindow('images/06-05.jpg',450,331) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-47d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-29i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-48d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-30i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-49d.jpg SHUS|javascript:displayWindow('images/06-06.jpg',450,254) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-06t.jpg SHUS|javascript:displayWindow('images/06-06.jpg',450,254) SHUS|javascript:displayWindow('images/06-07.jpg',400,354) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-07t.jpg SHUS|javascript:displayWindow('images/06-07.jpg',400,354) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-31i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-32i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-50d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-51d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-52d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-53d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-54d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-55d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-56d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-57d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-58d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-33i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-34i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-35i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-36i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-59d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-60d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-61d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-62d.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/212-215.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/220-226.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:Signature Schemes vti_lineageid:SR|{0C1252A3-6B50-464A-8527-C9670265A39D}