vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:04 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/346-347.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/352-354.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:04 -0000 vti_cacheddtm:TX|29 Jan 2009 11:52:36 -0000 vti_filesize:IR|13778 vti_cachedtitle:SR|Cryptography: Theory and Practice:Secret Sharing Schemes vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|346-347.html H|../ewtoc.html H|352-354.html S|images/11-71d.jpg S|images/11-72d.jpg S|images/11-73d.jpg S|images/11-74d.jpg S|images/11-75d.jpg S|images/11-76d.jpg S|images/11-77d.jpg S|images/11-145i.jpg S|images/11-78d.jpg S|images/11-79d.jpg S|images/11-146i.jpg S|images/11-147i.jpg S|images/11-148i.jpg S|images/11-149i.jpg S|images/11-150i.jpg S|images/11-151i.jpg S|images/11-152i.jpg S|images/11-153i.jpg S|images/11-80d.jpg S|images/11-81d.jpg S|images/11-82d.jpg S|images/11-83d.jpg S|images/11-84d.jpg S|images/11-85d.jpg S|images/11-154i.jpg S|images/11-155i.jpg S|images/11-156i.jpg S|images/11-86d.jpg S|images/11-87d.jpg S|images/11-88d.jpg S|images/11-89d.jpg S|images/11-90d.jpg S|images/11-91d.jpg S|images/11-157i.jpg S|images/11-158i.jpg S|images/11-159i.jpg S|images/11-92d.jpg S|images/11-93d.jpg S|images/11-94d.jpg S|images/11-95d.jpg S|images/11-96d.jpg S|images/11-160i.jpg S|images/11-161i.jpg S|images/11-97d.jpg S|images/11-98d.jpg S|images/11-99d.jpg S|images/11-100d.jpg S|images/11-101d.jpg S|images/11-102d.jpg S|images/11-103d.jpg S|images/11-162i.jpg S|images/11-104d.jpg H|346-347.html H|../ewtoc.html H|352-354.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/346-347.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/352-354.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-71d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-72d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-73d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-74d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-75d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-76d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-77d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-145i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-78d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-79d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-146i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-147i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-148i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-149i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-150i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-151i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-152i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-153i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-80d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-81d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-82d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-83d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-84d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-85d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-154i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-155i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-156i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-86d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-87d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-88d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-89d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-90d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-91d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-157i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-158i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-159i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-92d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-93d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-94d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-95d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-96d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-160i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-161i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-97d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-98d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-99d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-100d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-101d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-102d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-103d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-162i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-104d.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/346-347.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/352-354.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:Secret Sharing Schemes vti_lineageid:SR|{77ED29D8-B863-4037-9803-C16491FBFD9F}