next up previous
Next: Slide 28 Up: Networking Applications Previous: Slide 26

Cryptography: Decryption

\begin{figure}\centerline{\epsfig{figure=/home/sri/courses/figs/eps/decr,width=4in}}
\end{figure}

Common Crypto Techniques



Sridhar Iyer
2001-01-08