Books on the topic 'CRYPTOGRAPHI'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'CRYPTOGRAPHI.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Full textMi ma xue yuan li yu shi jian: Di er ban= Cryptography theory and practice. Beijing: Dian zi gong ye chu ban she, 2003.
Find full textChurchhouse, R. F. Codes and ciphers: Julius Caesar, the Enigma, and the internet. Cambridge: Cambridge University Press, 2002.
Find full textCodes and cryptography. Oxford [Oxfordshire]: Clarendon Press, 1988.
Find full textAn introduction to cryptology. Boston: Kluwer Academic Publishers, 1988.
Find full textéd, Walker M., ed. Cryptography and coding: 7th IMA conference, Cirencester, UK, December 20-22, 1999 : proceedings. Berlin: Springer, 1999.
Find full textStinson, Douglas R., and Maura B. Paterson. Cryptography. Fourth edition. | Boca Raton : CRC Press, Taylor & Francis: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Full textRubinstein-Salzedo, Simon. Cryptography. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Full textLevy, Steven. Crypto: How the code rebels beat the government-saving privacy in the digital age. New York: Viking, 2001.
Find full textC, Washington Lawrence, ed. Introduction to cryptography: With coding theory. Upper Saddle River, NJ: Prentice Hall, 2002.
Find full textJoe, Kilian, ed. Theory of cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings. Berlin: Springer, 2005.
Find full textC, Washington Lawrence, ed. Introduction to cryptography: With coding theory. 2nd ed. Upper Saddle River, N.J: Pearson Prentice Hall, 2005.
Find full textCrypto: How the code rebels beat the government, saving privacy in the digital age. New York: Viking, 2001.
Find full textNoonan, Diana. I spy. Bothell, WA: Wright Group, 1996.
Find full textAlgèbre avec applications à l'algorithmique et à la cryptographie. Paris: Ellipses, 2009.
Find full textSlayton, Rebecca, ed. Democratizing Cryptography. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3549993.
Full textFranklin, Matthew, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48390-x.
Full textOmondi, Amos R. Cryptography Arithmetic. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34142-8.
Full textKoç, Çetin Kaya, ed. Cryptographic Engineering. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71817-0.
Full textEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63115-4.
Full textHirschfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7.
Full textHirchfeld, Rafael, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055468.
Full textFerguson, Niels, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722367.
Full textBlaze, Matt, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36504-4.
Full textFrankel, Yair, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45472-1.
Full textDong, Ling, and Kefei Chen. Cryptographic Protocol. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7.
Full textHorváth, Máté, and Levente Buttyán. Cryptographic Obfuscation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.
Full textPaar, Christof, and Jan Pelzl. Understanding Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04101-3.
Full textWright, Rebecca N., ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45126-6.
Full textGrasselli, Federico. Quantum Cryptography. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64360-7.
Full textJuels, Ari, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98935.
Full textSyverson, Paul, ed. Financial Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46088-8.
Full textHershey, J. E. Cryptography demystified. New York: McGraw-Hill, 2003.
Find full textEasttom, William. Modern Cryptography. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7.
Full text1963-, Schneier Bruce, ed. Practical cryptography. New York: Wiley, 2003.
Find full textInternet cryptography. Reading, Mass: Addison-Wesley, 1997.
Find full textMartin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.
Full textMartin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.
Full textMartin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.
Full textF, Friedman William. Elementary Military Cryptography (Cryptographic Series , No 7). Aegean Park Pr, 1996.
Find full textAdvanced Military Cryptography (Cryptographic Series , No 8). Aegean Park Press, 1996.
Find full textGivierge, Marcel. Course in Cryptography (Cryptographic Series , No 19). Aegean Park Press, 1996.
Find full textMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Full textSmart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.
Find full textSmart, Nigel. Cryptography: An Introduction. Mcgraw-Hill College, 2004.
Find full textMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Full textF, Friedman William. Six Lectures Concerning Cryptography and Cryptanalysis (Cryptographic Series , No. 67). Aegean Park Pr, 1996.
Find full textCodes, Ciphers, Secrets and Cryptic Communication: Making and Breaking Sercet Messages from Hieroglyphocs to the Internet. Black Dog & Leventhal Publishers, 2005.
Find full textCryptography Cryptography Cryptography Cryptography. Independently Published, 2018.
Find full textDanesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.
Find full text