vti_encoding:SR|utf8-nl vti_timelastmodified:TR|04 Dec 2000 22:14:04 -0000 vti_extenderversion:SR|5.0.2.6417 vti_backlinkinfo:VX|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/352-354.html Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/357-358.html vti_author:SR|LKN\\predstojnik vti_modifiedby:SR|LKN\\predstojnik vti_timecreated:TR|04 Dec 2000 22:14:04 -0000 vti_cacheddtm:TX|29 Jan 2009 11:52:38 -0000 vti_filesize:IR|12025 vti_cachedtitle:SR|Cryptography: Theory and Practice:Secret Sharing Schemes vti_cachedbodystyle:SR| vti_cachedlinkinfo:VX|S|../0849385210.gif H|352-354.html H|../ewtoc.html H|357-358.html S|images/11-187i.jpg S|images/11-188i.jpg S|images/11-189i.jpg S|images/11-190i.jpg S|images/11-191i.jpg S|images/11-115d.jpg S|images/11-192i.jpg S|images/11-116d.jpg S|images/11-193i.jpg S|images/11-194i.jpg S|images/11-195i.jpg S|images/11-196i.jpg S|images/11-197i.jpg S|images/11-198i.jpg S|images/11-199i.jpg S|images/11-200i.jpg S|images/11-201i.jpg S|images/11-202i.jpg S|images/11-117d.jpg S|images/11-118d.jpg S|images/11-119d.jpg S|images/11-120d.jpg S|images/11-203i.jpg S|images/11-204i.jpg S|images/11-205i.jpg S|images/11-206i.jpg S|images/11-207i.jpg S|images/11-208i.jpg S|images/11-209i.jpg S|images/11-121d.jpg S|images/11-122d.jpg S|images/11-123d.jpg S|images/11-124d.jpg S|images/11-210i.jpg S|images/11-211i.jpg S|images/11-212i.jpg S|images/11-213i.jpg S|images/11-214i.jpg S|images/11-215i.jpg S|images/11-216i.jpg H|352-354.html H|../ewtoc.html H|357-358.html H|/reference/crc00001.html vti_cachedsvcrellinks:VX|FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/0849385210.gif FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/352-354.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/357-358.html FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-187i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-188i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-189i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-190i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-191i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-115d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-192i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-116d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-193i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-194i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-195i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-196i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-197i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-198i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-199i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-200i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-201i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-202i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-117d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-118d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-119d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-120d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-203i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-204i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-205i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-206i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-207i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-208i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-209i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-121d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-122d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-123d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-124d.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-210i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-211i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-212i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-213i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-214i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-215i.jpg FSUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/images/11-216i.jpg FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/352-354.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ewtoc.html FHUS|Vaje/KK/KNJIGE/Cryptography\\ -Theory\\ And\\ Practice-Stinson/ch11/357-358.html NHUS|file:///reference/crc00001.html vti_cachedneedsrewrite:BR|true vti_cachedhasbots:BR|false vti_cachedhastheme:BR|false vti_cachedhasborder:BR|false vti_metatags:VR|vsisbn 0849385210 vstitle Cryptography:\\ Theory\\ and\\ Practice vsauthor Douglas\\ Stinson vsimprint CRC\\ Press vspublisher CRC\\ Press\\ LLC vspubdate 03/17/95 vscategory Web\\ and\\ Software\\ Development:\\ Cryptography ROBOTS NOINDEX,\\ NOFOLLOW vti_charset:SR|windows-1252 vti_title:SR|Cryptography: Theory and Practice:Secret Sharing Schemes vti_lineageid:SR|{04E8A8F4-3E8B-464D-A9EA-E1F3BC37A83A}