Contemporary cryptography /
I tiakina i:
Kaituhi matua: | Oppliger, Rolf (Author) |
---|---|
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Boston :
Artech House,
[2011]
|
Putanga: | Second edition. |
Rangatū: | Artech House information security and privacy series.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Contemporary cryptography
mā: Oppliger, Rolf
I whakaputaina: (2005)
mā: Oppliger, Rolf
I whakaputaina: (2005)
Codes and ciphers Julius Caesar, the Enigma, and the internet /
mā: Churchhouse, R. F.
I whakaputaina: (2002)
mā: Churchhouse, R. F.
I whakaputaina: (2002)
Real Life Cryptology : Ciphers and Secrets in Early Modern Hungary /
mā: Láng, Benedek, 1974-
I whakaputaina: (2018)
mā: Láng, Benedek, 1974-
I whakaputaina: (2018)
Mercury, or, The secret and swift messenger shewing how a man may with privacy and speed communicate his thoughts to a friend at any distance ; together with, An abstract of Dr. Wilkins's essays towards a real character and a philosophical language /
mā: Wilkins, John, 1614-1672
I whakaputaina: (1984)
mā: Wilkins, John, 1614-1672
I whakaputaina: (1984)
Basics of contemporary cryptography for IT practitioners
mā: Ryabko, Boris
I whakaputaina: (2005)
mā: Ryabko, Boris
I whakaputaina: (2005)
Cryptography for developers
mā: St. Denis, Tom
I whakaputaina: (2007)
mā: St. Denis, Tom
I whakaputaina: (2007)
Coding and cryptography : synergy for a robust communication /
mā: Živić, Nataša
I whakaputaina: (2013)
mā: Živić, Nataša
I whakaputaina: (2013)
Cryptography protocols, design and applications /
I whakaputaina: (2012)
I whakaputaina: (2012)
An introduction to mathematical cryptography
mā: Hoffstein, Jeffrey
I whakaputaina: (2008)
mā: Hoffstein, Jeffrey
I whakaputaina: (2008)
Quantum cryptography potentially perfect security.
I whakaputaina: (2003)
I whakaputaina: (2003)
Identity-based cryptography
I whakaputaina: (2009)
I whakaputaina: (2009)
User's guide to cryptography and standards
mā: Dent, Alexander W.
I whakaputaina: (2005)
mā: Dent, Alexander W.
I whakaputaina: (2005)
IBM eserver zSeries 990 (z990) cryptography implementation
I whakaputaina: (2004)
I whakaputaina: (2004)
Cryptography's role in securing the information society
I whakaputaina: (1996)
I whakaputaina: (1996)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
mā: Omollo, Richard Otieno, me ētahi atu.
I whakaputaina: (2025)
mā: Omollo, Richard Otieno, me ētahi atu.
I whakaputaina: (2025)
Quantum cryptography and computing theory and implementation /
I whakaputaina: (2010)
I whakaputaina: (2010)
Public-key cryptography and computational number theory proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000 /
I whakaputaina: (2001)
I whakaputaina: (2001)
Physics and theoretical computer science from numbers and languages to (quantum) cryptography security /
I whakaputaina: (2007)
I whakaputaina: (2007)
Advanced linear cryptanalysis of block and stream ciphers
I whakaputaina: (2011)
I whakaputaina: (2011)
Online information review.
I whakaputaina: (2007)
I whakaputaina: (2007)
Elementary cryptanalysis a mathematical approach /
mā: Sinkov, Abraham, 1907-
I whakaputaina: (2009)
mā: Sinkov, Abraham, 1907-
I whakaputaina: (2009)
Secure multi-party computation
I whakaputaina: (2013)
I whakaputaina: (2013)
Secret language
mā: Blake, Barry J.
I whakaputaina: (2010)
mā: Blake, Barry J.
I whakaputaina: (2010)
zSeries crypto guide update
I whakaputaina: (2003)
I whakaputaina: (2003)
Algebraic geometry modeling in information theory
I whakaputaina: (2013)
I whakaputaina: (2013)
Advances in coding theory and crytography
I whakaputaina: (2007)
I whakaputaina: (2007)
Advances on superelliptic curves and their applications /
I whakaputaina: (2015)
I whakaputaina: (2015)
Colossus the secrets of Bletchley Park's codebreaking computers /
I whakaputaina: (2006)
I whakaputaina: (2006)
zSeries Trusted Key Entry (TKE) version 4.2 update
mā: Kappeler, Patrick
I whakaputaina: (2004)
mā: Kappeler, Patrick
I whakaputaina: (2004)
Boolean functions in cryptology and information security
I whakaputaina: (2008)
I whakaputaina: (2008)
Modelling cyber security approaches, methodology, strategies /
I whakaputaina: (2009)
I whakaputaina: (2009)
Intelligent watermarking techniques
I whakaputaina: (2004)
I whakaputaina: (2004)
Hashing in computer science fifty years of slicing and dicing /
mā: Konheim, Alan G., 1934-
I whakaputaina: (2010)
mā: Konheim, Alan G., 1934-
I whakaputaina: (2010)
Quantum communication and security
I whakaputaina: (2007)
I whakaputaina: (2007)
Applied public key infrastructure 4th International Workshop : IWAP 2005 /
I whakaputaina: (2005)
I whakaputaina: (2005)
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
I whakaputaina: (2008)
I whakaputaina: (2008)
Introduction to identity-based encryption
mā: Martin, Luther
I whakaputaina: (2008)
mā: Martin, Luther
I whakaputaina: (2008)
The Cryptographic Imagination : Secret Writing from Edgar Poe to the Internet /
mā: Rosenheim, Shawn
I whakaputaina: (2019)
mā: Rosenheim, Shawn
I whakaputaina: (2019)
Nanomechanics and nanoelectronics molecule-size machines /
mā: Patch, Kimberly
I whakaputaina: (2004)
mā: Patch, Kimberly
I whakaputaina: (2004)
The reader of gentlemen's mail Herbert O. Yardley and the birth of American codebreaking /
mā: Kahn, David, 1930-
I whakaputaina: (2004)
mā: Kahn, David, 1930-
I whakaputaina: (2004)
Ngā tūemi rite
-
Contemporary cryptography
mā: Oppliger, Rolf
I whakaputaina: (2005) -
Codes and ciphers Julius Caesar, the Enigma, and the internet /
mā: Churchhouse, R. F.
I whakaputaina: (2002) -
Real Life Cryptology : Ciphers and Secrets in Early Modern Hungary /
mā: Láng, Benedek, 1974-
I whakaputaina: (2018) -
Mercury, or, The secret and swift messenger shewing how a man may with privacy and speed communicate his thoughts to a friend at any distance ; together with, An abstract of Dr. Wilkins's essays towards a real character and a philosophical language /
mā: Wilkins, John, 1614-1672
I whakaputaina: (1984) -
Basics of contemporary cryptography for IT practitioners
mā: Ryabko, Boris
I whakaputaina: (2005)