The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
اقرأ المزيدThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
اقرأ المزيدThis book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October ...
اقرأ المزيدThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
اقرأ المزيدThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
اقرأ المزيدThis book treats the Mathematics of many important areas in digital information processing.It covers, in a unified presentation, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Algorithmic Number Theory Symposium, ANTS 2006, held ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held ...
اقرأ المزيدHere are the refereed proceedings of the 6th Italian Conference on Algorithms and Computation, CIAC 2006. The 33 revised ...
اقرأ المزيدThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
اقرأ المزيدThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th International Symposium on Algorithms and Computation, ISAAC 2005, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Symposium on Algorithms and Computation, ISAAC 2006, ...
اقرأ المزيدThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
اقرأ المزيدAn Introduction to Number Theory provides an introduction to the main streams of number theory. Starting with the unique ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
اقرأ المزيدAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
اقرأ المزيدAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms ...
اقرأ المزيد