Public-key cryptography and computational number theory proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000 /
Sábháilte in:
Údair chorparáideacha: | ebrary, Inc, International Conference on Public-Key Cryptography and Computational Number Theory |
---|---|
Rannpháirtithe: | Alster, Kazimierz, Urbanowicz, Jerzy, 1951-, Williams, Hugh C. |
Formáid: | Leictreonach Imeacht comhdhála Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Berlin ; New York :
Walter de Gruyter,
c2001.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Coding and cryptography : synergy for a robust communication /
de réir: Živić, Nataša
Foilsithe / Cruthaithe: (2013)
de réir: Živić, Nataša
Foilsithe / Cruthaithe: (2013)
Advances in coding theory and crytography
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
An introduction to mathematical cryptography
de réir: Hoffstein, Jeffrey
Foilsithe / Cruthaithe: (2008)
de réir: Hoffstein, Jeffrey
Foilsithe / Cruthaithe: (2008)
Algebraic geometry modeling in information theory
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Foilsithe / Cruthaithe: (2005)
Foilsithe / Cruthaithe: (2005)
Identity-based cryptography
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Arithmetic, geometry, and coding theory proceedings of the international conference held at Centre International de Rencontres Mathématiques (CIRM), Luminy, France, June 28-July 2, 1993 /
Foilsithe / Cruthaithe: (1996)
Foilsithe / Cruthaithe: (1996)
Codes and designs proceedings of a conference honoring Professor Dijen K. Ray-Chaudhuri on the occasion of his 65th birthday, The Ohio State University, May 18-21, 2000 /
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Codes over rings proceedings of the CIMPA Summer School : Ankara, Turkey, 18-29 August, 2008 /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Fundamentals of codes, graphs, and iterative decoding
de réir: Wicker, Stephen B.
Foilsithe / Cruthaithe: (2003)
de réir: Wicker, Stephen B.
Foilsithe / Cruthaithe: (2003)
Coding theory algorithms, architectures, and applications /
de réir: Neubauer, Andre
Foilsithe / Cruthaithe: (2007)
de réir: Neubauer, Andre
Foilsithe / Cruthaithe: (2007)
Information theory coding theorems for discrete memoryless systems /
de réir: Csisz�ar, Imre, 1938-
Foilsithe / Cruthaithe: (2011)
de réir: Csisz�ar, Imre, 1938-
Foilsithe / Cruthaithe: (2011)
CodeIgniter 2 cookbook : over 80 recipes to help you create CodeIgniter-powered applications and solve common coding problems /
de réir: Foster, Rob
Foilsithe / Cruthaithe: (2013)
de réir: Foster, Rob
Foilsithe / Cruthaithe: (2013)
Quantum cryptography and computing theory and implementation /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Coding theory a first course /
de réir: Ling, San, 1964-
Foilsithe / Cruthaithe: (2004)
de réir: Ling, San, 1964-
Foilsithe / Cruthaithe: (2004)
Introduction to identity-based encryption
de réir: Martin, Luther
Foilsithe / Cruthaithe: (2008)
de réir: Martin, Luther
Foilsithe / Cruthaithe: (2008)
Contemporary cryptography /
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2011)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2011)
Domesticating symbols : metalithikum II /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Contemporary cryptography
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2005)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2005)
Cryptography for developers
de réir: St. Denis, Tom
Foilsithe / Cruthaithe: (2007)
de réir: St. Denis, Tom
Foilsithe / Cruthaithe: (2007)
Cryptography protocols, design and applications /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Basics of contemporary cryptography for IT practitioners
de réir: Ryabko, Boris
Foilsithe / Cruthaithe: (2005)
de réir: Ryabko, Boris
Foilsithe / Cruthaithe: (2005)
Quantum cryptography potentially perfect security.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
Interim review of the Florida Keys Carrying Capacity Study
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
A Review of the Florida Keys carrying capacity study
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Physics and theoretical computer science from numbers and languages to (quantum) cryptography security /
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Advances on superelliptic curves and their applications /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
User's guide to cryptography and standards
de réir: Dent, Alexander W.
Foilsithe / Cruthaithe: (2005)
de réir: Dent, Alexander W.
Foilsithe / Cruthaithe: (2005)
Key account management : strategies to leverage information, technology, and relationships to deliver value to large customers /
de réir: Le Bon, Jo�el (College teacher), et al.
Foilsithe / Cruthaithe: (2015)
de réir: Le Bon, Jo�el (College teacher), et al.
Foilsithe / Cruthaithe: (2015)
IBM eserver zSeries 990 (z990) cryptography implementation
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Information theory /
de réir: Alencar, Marcelo S., 1957-
Foilsithe / Cruthaithe: (2015)
de réir: Alencar, Marcelo S., 1957-
Foilsithe / Cruthaithe: (2015)
Cryptography's role in securing the information society
Foilsithe / Cruthaithe: (1996)
Foilsithe / Cruthaithe: (1996)
Boolean functions in cryptology and information security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Unlocking V.O. Key Jr Southern politics for the twenty-first century /
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
The reformation of the keys confession, conscience, and authority in sixteenth-century Germany /
de réir: Rittgers, Ronald K., 1965-
Foilsithe / Cruthaithe: (2004)
de réir: Rittgers, Ronald K., 1965-
Foilsithe / Cruthaithe: (2004)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
de réir: Omollo, Richard Otieno, et al.
Foilsithe / Cruthaithe: (2025)
de réir: Omollo, Richard Otieno, et al.
Foilsithe / Cruthaithe: (2025)
High-security mechanical locks an encyclopedic reference /
de réir: Pulford, Graham W.
Foilsithe / Cruthaithe: (2007)
de réir: Pulford, Graham W.
Foilsithe / Cruthaithe: (2007)
Handbook of strategic account management : a comprehensive resource /
de réir: Woodburn, Diana, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Woodburn, Diana, et al.
Foilsithe / Cruthaithe: (2014)
Quantum communication and security
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Míreanna comhchosúla
-
Coding and cryptography : synergy for a robust communication /
de réir: Živić, Nataša
Foilsithe / Cruthaithe: (2013) -
Advances in coding theory and crytography
Foilsithe / Cruthaithe: (2007) -
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Foilsithe / Cruthaithe: (2008) -
An introduction to mathematical cryptography
de réir: Hoffstein, Jeffrey
Foilsithe / Cruthaithe: (2008) -
Algebraic geometry modeling in information theory
Foilsithe / Cruthaithe: (2013)