vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:02 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/246-250.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/237-242.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:02 -0000 vti_cacheddtm:TX|29 Jan 2009 11:51:51 -0000 vti_filesize:IR|12400 vti_cachedtitle:SR|Cryptography: Theory and Practice:Hash Functions vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|237-242.html H|../ewtoc.html H|246-250.html S|images/07-10i.jpg S|images/07-11i.jpg S|images/07-41d.jpg S|images/07-42d.jpg S|images/07-12i.jpg S|images/07-13i.jpg S|images/07-14i.jpg S|images/07-43d.jpg S|images/07-15i.jpg S|images/07-16i.jpg S|images/07-17i.jpg S|images/07-44d.jpg S|images/07-18i.jpg S|images/07-19i.jpg S|images/07-45d.jpg S|images/07-20i.jpg S|images/07-21i.jpg S|images/07-46d.jpg S|images/07-22i.jpg S|images/07-23i.jpg S|images/07-24i.jpg S|images/07-25i.jpg H|javascript:displayWindow('images/07-05.jpg',500,147) S|images/07-05t.jpg H|javascript:displayWindow('images/07-05.jpg',500,147) S|images/07-26i.jpg S|images/07-47d.jpg S|images/07-27i.jpg S|images/07-48d.jpg S|images/07-28i.jpg S|images/07-29i.jpg S|images/07-30i.jpg S|images/07-31i.jpg S|images/07-49d.jpg S|images/07-50d.jpg S|images/07-32i.jpg S|images/07-33i.jpg S|images/07-34i.jpg S|images/07-51d.jpg S|images/07-35i.jpg S|images/07-52d.jpg S|images/07-53d.jpg S|images/07-36i.jpg S|images/07-37i.jpg S|images/07-54d.jpg S|images/07-38i.jpg S|images/07-55d.jpg H|237-242.html H|../ewtoc.html H|246-250.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/237-242.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/246-250.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-10i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-11i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-41d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-42d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-12i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-13i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-14i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-43d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-15i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-16i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-17i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-44d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-18i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-19i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-45d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-20i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-21i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-46d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-22i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-23i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-24i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-25i.jpg SHUS|javascript:displayWindow('images/07-05.jpg',500,147) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-05t.jpg SHUS|javascript:displayWindow('images/07-05.jpg',500,147) FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-26i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-47d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-27i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-48d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-28i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-29i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-30i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-31i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-49d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-50d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-32i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-33i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-34i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-51d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-35i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-52d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-53d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-36i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-37i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-54d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-38i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/images/07-55d.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/237-242.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch07/246-250.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:Hash Functions vti_lineageid:SR|{F233D17A-C6C9-4CB1-995F-75E1D9AC3AEE}