Includes bibliographical references ( leaves 137-138).1 bound copy: ii, 138 leaves; ill.; 30 cm. available at RNL
The security provided by the block cipher algorithms is a top modern approached issue within the spe...
Features Excellent organization of material and numbering of items provides easy and rapid access o...
The widespread use of computer technology for information handling resulted in the need for higher d...
Includes bibliographical references (pages 89)CRYPTO is a computer-aided laboratory for cryptographi...
Version 3.274 Title word cross-reference #1 [Man01, RSA02]. #10 [RSA00b]. #11 [RSA01, Clu03]. #13 [R...
Includes bibliographical references (leaf 82)Cryptography is the art and science of encryption and i...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
International audienceExpanded into two volumes, the Second Edition of Springer's Encyclopedia of Cr...
The Handbook of Information and Communication Security covers some of the latest advances in fundame...
Version 4.72 Title word cross-reference (modp) [Pol78]. 1/2 + 1Poly(logN) [ACGS84]. 25 109 [PSW80]....
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
There are many aspects to security and many applications, ranging from secure commerce and payments ...
Includes bibliographical references (leaf 65).1 bound copy: viii, 68 leaves; ill.; 30 cm. available ...
In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over...
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government comm...
The security provided by the block cipher algorithms is a top modern approached issue within the spe...
Features Excellent organization of material and numbering of items provides easy and rapid access o...
The widespread use of computer technology for information handling resulted in the need for higher d...
Includes bibliographical references (pages 89)CRYPTO is a computer-aided laboratory for cryptographi...
Version 3.274 Title word cross-reference #1 [Man01, RSA02]. #10 [RSA00b]. #11 [RSA01, Clu03]. #13 [R...
Includes bibliographical references (leaf 82)Cryptography is the art and science of encryption and i...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
International audienceExpanded into two volumes, the Second Edition of Springer's Encyclopedia of Cr...
The Handbook of Information and Communication Security covers some of the latest advances in fundame...
Version 4.72 Title word cross-reference (modp) [Pol78]. 1/2 + 1Poly(logN) [ACGS84]. 25 109 [PSW80]....
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
There are many aspects to security and many applications, ranging from secure commerce and payments ...
Includes bibliographical references (leaf 65).1 bound copy: viii, 68 leaves; ill.; 30 cm. available ...
In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over...
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government comm...
The security provided by the block cipher algorithms is a top modern approached issue within the spe...
Features Excellent organization of material and numbering of items provides easy and rapid access o...
The widespread use of computer technology for information handling resulted in the need for higher d...