Elementary cryptanalysis a mathematical approach /
Na minha lista:
Autor principal: | Sinkov, Abraham, 1907- |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros Autores: | Feil, Todd, 1951- |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
[Washington, D.C.] : Cambridge :
Mathematical Association of America ; Cambridge University Press [distributor],
c2009.
|
Edição: | 2nd ed. / |
Colecção: | Anneli Lax new mathematical library ;
v. 22 |
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Advanced linear cryptanalysis of block and stream ciphers
Publicado em: (2011)
Publicado em: (2011)
Codes and ciphers Julius Caesar, the Enigma, and the internet /
Por: Churchhouse, R. F.
Publicado em: (2002)
Por: Churchhouse, R. F.
Publicado em: (2002)
Secret language
Por: Blake, Barry J.
Publicado em: (2010)
Por: Blake, Barry J.
Publicado em: (2010)
Physics and theoretical computer science from numbers and languages to (quantum) cryptography security /
Publicado em: (2007)
Publicado em: (2007)
Colossus the secrets of Bletchley Park's codebreaking computers /
Publicado em: (2006)
Publicado em: (2006)
An introduction to mathematical cryptography
Por: Hoffstein, Jeffrey
Publicado em: (2008)
Por: Hoffstein, Jeffrey
Publicado em: (2008)
Basics of contemporary cryptography for IT practitioners
Por: Ryabko, Boris
Publicado em: (2005)
Por: Ryabko, Boris
Publicado em: (2005)
Alan Turing his work and impact /
Publicado em: (2013)
Publicado em: (2013)
Cryptography for developers
Por: St. Denis, Tom
Publicado em: (2007)
Por: St. Denis, Tom
Publicado em: (2007)
Secure multi-party computation
Publicado em: (2013)
Publicado em: (2013)
Quantum cryptography potentially perfect security.
Publicado em: (2003)
Publicado em: (2003)
zSeries crypto guide update
Publicado em: (2003)
Publicado em: (2003)
IBM eserver zSeries 990 (z990) cryptography implementation
Publicado em: (2004)
Publicado em: (2004)
Cryptography protocols, design and applications /
Publicado em: (2012)
Publicado em: (2012)
Contemporary cryptography /
Por: Oppliger, Rolf
Publicado em: (2011)
Por: Oppliger, Rolf
Publicado em: (2011)
Identity-based cryptography
Publicado em: (2009)
Publicado em: (2009)
The handwriting of God : sacred mysteries of the Bible /
Por: Jeffrey, Grant R.
Publicado em: (1997)
Por: Jeffrey, Grant R.
Publicado em: (1997)
Mathematics for elementary teachers : a contemporary approach /
Por: Musser, Gary L.
Publicado em: (1991)
Por: Musser, Gary L.
Publicado em: (1991)
Mathematics for elementary teachers : a contemporary approach /
Por: Musser, Gary L.
Publicado em: (1994)
Por: Musser, Gary L.
Publicado em: (1994)
User's guide to cryptography and standards
Por: Dent, Alexander W.
Publicado em: (2005)
Por: Dent, Alexander W.
Publicado em: (2005)
Mathematics for elementary teachers : a balanced approach /
Por: Krause, Eugene F., 1937-
Publicado em: (1987)
Por: Krause, Eugene F., 1937-
Publicado em: (1987)
Mathematics for elementary teachers : a conceptual approach /
Por: Bennett, Albert B.
Publicado em: (2004)
Por: Bennett, Albert B.
Publicado em: (2004)
Modelling cyber security approaches, methodology, strategies /
Publicado em: (2009)
Publicado em: (2009)
Coding and cryptography : synergy for a robust communication /
Por: Živić, Nataša
Publicado em: (2013)
Por: Živić, Nataša
Publicado em: (2013)
Mathematics for elementary school teachers /
Por: Garstens, Helen L.
Publicado em: (1967)
Por: Garstens, Helen L.
Publicado em: (1967)
Contemporary cryptography
Por: Oppliger, Rolf
Publicado em: (2005)
Por: Oppliger, Rolf
Publicado em: (2005)
Real Life Cryptology : Ciphers and Secrets in Early Modern Hungary /
Por: Láng, Benedek, 1974-
Publicado em: (2018)
Por: Láng, Benedek, 1974-
Publicado em: (2018)
Elementary mathematical models order aplenty and a glimpse of chaos /
Por: Kalman, Dan
Publicado em: (1997)
Por: Kalman, Dan
Publicado em: (1997)
Elementary mathematics for economists.
Por: Dinwiddy, Caroline L.
Publicado em: (1967)
Por: Dinwiddy, Caroline L.
Publicado em: (1967)
Intelligent watermarking techniques
Publicado em: (2004)
Publicado em: (2004)
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
Publicado em: (2005)
Publicado em: (2005)
Hashing in computer science fifty years of slicing and dicing /
Por: Konheim, Alan G., 1934-
Publicado em: (2010)
Por: Konheim, Alan G., 1934-
Publicado em: (2010)
Online information review.
Publicado em: (2007)
Publicado em: (2007)
Teaching elementary mathematics : an active approach /
Por: Kutz, Ronald E.
Publicado em: (1991)
Por: Kutz, Ronald E.
Publicado em: (1991)
Elementary mathematics : arithmetic algebra and geometry /
Por: Hemmerling, Edwin M.
Publicado em: (1965)
Por: Hemmerling, Edwin M.
Publicado em: (1965)
The Cryptographic Imagination : Secret Writing from Edgar Poe to the Internet /
Por: Rosenheim, Shawn
Publicado em: (2019)
Por: Rosenheim, Shawn
Publicado em: (2019)
Discrete mathematics
Por: Vatsa, B. S.
Publicado em: (2009)
Por: Vatsa, B. S.
Publicado em: (2009)
Understanding the structure of elementary school mathematics /
Por: Fendel, Daniel M.
Publicado em: (1987)
Por: Fendel, Daniel M.
Publicado em: (1987)
Mathematics and the elementary teacher /
Por: Copeland, Richard W.
Publicado em: (1982)
Por: Copeland, Richard W.
Publicado em: (1982)
Introduction to identity-based encryption
Por: Martin, Luther
Publicado em: (2008)
Por: Martin, Luther
Publicado em: (2008)
Registos relacionados
-
Advanced linear cryptanalysis of block and stream ciphers
Publicado em: (2011) -
Codes and ciphers Julius Caesar, the Enigma, and the internet /
Por: Churchhouse, R. F.
Publicado em: (2002) -
Secret language
Por: Blake, Barry J.
Publicado em: (2010) -
Physics and theoretical computer science from numbers and languages to (quantum) cryptography security /
Publicado em: (2007) -
Colossus the secrets of Bletchley Park's codebreaking computers /
Publicado em: (2006)