|
@ -11,7 +11,7 @@ |
|
|
|
|
|
|
|
|
\begin{figure}[H] |
|
|
\begin{figure}[H] |
|
|
\centering |
|
|
\centering |
|
|
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-key-generation.png} |
|
|
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-key-generation} |
|
|
\caption{Παραγωγή ασύμμετρου ζεύγους κλειδιών} |
|
|
\caption{Παραγωγή ασύμμετρου ζεύγους κλειδιών} |
|
|
\end{figure} |
|
|
\end{figure} |
|
|
|
|
|
|
|
@ -30,7 +30,7 @@ |
|
|
|
|
|
|
|
|
\begin{figure}[H] |
|
|
\begin{figure}[H] |
|
|
\centering |
|
|
\centering |
|
|
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication.png} |
|
|
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication} |
|
|
\caption{Κρυπτογράφηση απ' άκρη σ' άκρη} |
|
|
\caption{Κρυπτογράφηση απ' άκρη σ' άκρη} |
|
|
\end{figure} |
|
|
\end{figure} |
|
|
|
|
|
|
|
|