Difference between revisions of "CSE539 Applied Cryptography"

From esoterum.org
Jump to: navigation, search
Line 11: Line 11:
 
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection]
 
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection]
 
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]
 
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]
 +
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses]

Revision as of 00:01, 28 February 2007

Good to know

Ken Thompson's On Trusting Trust, 1984

Homework 1: 8 February 13 February

-Flash Enigma emulator (Germany)

Homework 2: 28 February