نتایج جستجو
Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings
Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.), 2003
Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.), 2004
Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings
Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.), 2005
.NET Security and Cryptography
Peter Thorsteinson, G. Gnana Arun Ganesh, 2003
A Cryptography Primer: Secrets and Promises
Klein P.N., 2014
Cryptography and Lattices: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2001 Revised Papers
Miklós Ajtai, Ravi Kumar, Dandapani Sivakumar (auth.), Joseph H. Silverman (eds.), 2001
Boolean Functions and Their Applications in Cryptography
Chuan-Kun Wu, Dengguo Feng (auth.), 2016
Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
Ioana Boureanu, Philippe Owesarski, Serge Vaudenay (eds.), 2014
Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography
Gerhard Rosenberger, Benjamin Fine, Celine Carstensen, 2011
Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography
Gerhard Rosenberger, Benjamin Fine, Celine Carstensen, 2011
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
Coding and cryptography
Koerner T.W., 1998
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
John Viega, Matt Messier, 2003
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
John Viega, Matt Messier, 2003
Communications and Cryptography: Two Sides of One Tapestry
G. B. Agnew (auth.), Richard E. Blahut, Daniel J. Costello Jr., Ueli Maurer, Thomas Mittelholzer (eds.), 1994
A course in number theory and cryptography
Neal Koblitz, 1994
A Course in Number Theory and Cryptography
Neal Koblitz (auth.), 1987
A Course in Number Theory and Cryptography
Neal Koblitz (auth.), 1994
A Course in Number Theory and Cryptography (Graduate Texts in Mathematics)
Neal Koblitz, 1994
