vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:02 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/229-231.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/220-226.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:02 -0000 vti_cacheddtm:TX|29 Jan 2009 11:51:39 -0000 vti_filesize:IR|11636 vti_cachedtitle:SR|Cryptography: Theory and Practice:Signature Schemes vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|220-226.html H|../ewtoc.html H|229-231.html S|images/06-43i.jpg S|images/06-87d.jpg S|images/06-88d.jpg S|images/06-89d.jpg S|images/06-44i.jpg S|images/06-90d.jpg S|images/06-45i.jpg S|images/06-91d.jpg S|images/06-92d.jpg S|images/06-46i.jpg S|images/06-47i.jpg S|images/06-93d.jpg S|images/06-94d.jpg S|images/06-48i.jpg S|images/06-95d.jpg S|images/06-96d.jpg S|images/06-97d.jpg S|images/06-49i.jpg S|images/06-50i.jpg S|images/06-98d.jpg S|images/06-51i.jpg S|images/06-99d.jpg S|images/06-100d.jpg S|images/06-101d.jpg S|images/06-102d.jpg S|images/06-103d.jpg S|images/06-104d.jpg S|images/06-105d.jpg H|220-226.html H|../ewtoc.html H|229-231.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/220-226.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/229-231.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-43i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-87d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-88d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-89d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-44i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-90d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-45i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-91d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-92d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-46i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-47i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-93d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-94d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-48i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-95d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-96d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-97d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-49i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-50i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-98d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-51i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-99d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-100d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-101d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-102d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-103d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-104d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/images/06-105d.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/220-226.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch06/229-231.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:Signature Schemes vti_lineageid:SR|{D39A0F94-97EA-41F3-8B7E-AFCA1DE79AFA}