Information technology. Security techniques. Modes of operation for an n-bit cipher from other stores

Items per page