Search
Next:
0.5.8 Fibonacci Calculation
Up:
0.5.7 Addition Chaining
Previous:
0.5.7.2 Source Code
0.5.7.3 References
1.
Schneier, Bruce 1996,
Applied Cryptography, 2nd Ed.
(New York, NY: John Wiley & Sons, Inc.). pg. 243-244.
Scott Gasch
1999-07-09