نتایج جستجو
Cryptography and Coding: 5th IMA Conference Cirencester, UK, December 18–20, 1995 Proceedings
Paul C. van Oorschot (auth.), 1995
Cryptography for Developers
Simon Johnson
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten(auth.), 2013
Physics and Theoretical Computer Science: From Numbers and Languages to (Quantum) Cryptography
J.-P. Gazeau, J. Nesetril, 2007
Introduction to Mathematical Cryptography
Jeffrey Hoffstein, 2010
Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3–5, 1995 Proceedings
Professor William J. Caelli (auth.), 1996
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten, 2013
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten, 2013
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2005
Encyclopedia of cryptography and security
van Tilborg H.C.A., 2005
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg, 2011
Encyclopedia of cryptography and security
Henk CAvan Tilborg, 2011
Encyclopedia of Cryptography and Security
Anne Canteaut Prof. (auth.), 2011
Encyclopedia of Cryptography and Security , 2nd Edition
Henk C. A. Van Tilborg, 2011
Encyclopedia of Cryptography and Security, 2nd Edition
Henk C. A. Van Tilborg, 2011
