To see the other types of publications on this topic, follow the link: Secret-key cryptography.

Books on the topic 'Secret-key cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 books for your research on the topic 'Secret-key cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Warner, Penny. The secret of the skeleton key. New York: Egmont USA, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Galbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Secret warriors: Key scientists, code breakers and propagandists of the Great War. London: Little, Brown, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Noiseless steganography: The key to covert communications. Boca Raton: Auerbach Publications, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1943-, Spector Ronald H., ed. Listening to the enemy: Key documents on the role of communications intelligence in the war with Japan. Wilmington, Del: Scholarly Resources Inc., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. University of Cambridge ESOL Examinations, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Assche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rubin, Frank. Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Galbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Galbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Downing, Taylor. Secret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Little, Brown Book Group Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Secret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Abacus, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Desoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography