[Redaktim i kontrolluar][Redaktim i kontrolluar]
Content deleted Content added
Rreshti 32:
| journal = IBM Journal of Research and Development
| volume = 38
| issue = 3 | pages = 243–250 | year = 1994 | url = http://dx.doi.org/10.1147/rd.383.0243 | format = PDF}}
| issue = 3
| pages = 243–250 | year = 1994 | url = http://dx.doi.org/10.1147/rd.383.0243 | format = PDF}}
* {{cite book
| ref = CITEREFSchneier1994
| authorlink = Bruce Schneier
| title = Applied Cryptography, Second Edition | publisher = John Wiley & Sons | year = 1996 | pages = 296–298, 349 | isbn = 0-471-11709-9 }}
| publisher = John Wiley & Sons | year = 1996 | pages = 296–298, 349 | isbn = 0-471-11709-9 }}
 
== Lidhjet ndihmëse ==