skip to main content
column

Ancient and modern cryptography

Published:27 March 2015Publication History

Abstract

No abstract available.

Index Terms

  1. Ancient and modern cryptography

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image XRDS: Crossroads, The ACM Magazine for Students
              XRDS: Crossroads, The ACM Magazine for Students  Volume 21, Issue 3
              Cryptography
              Spring 2015
              55 pages
              ISSN:1528-4972
              EISSN:1528-4980
              DOI:10.1145/2752549
              Issue’s Table of Contents

              Copyright © 2015 Owner/Author

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 27 March 2015

              Check for updates

              Qualifiers

              • column
              • Popular
              • Un-reviewed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format