الكتب الالكترونية

عدد الكتب: 1 - 20 /34
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

اقرأ المزيد
978-3-540-76900-2
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

اقرأ المزيد
978-3-540-79456-1
Algorithmic Number Theory : 8th International Symposium, ANTS-VIII Banff, Canada, May 17-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held ...

اقرأ المزيد
978-3-540-77224-8
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...

اقرأ المزيد
978-3-540-77224-8
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...

اقرأ المزيد
978-3-540-78153-0
Architecture of Computing Systems - ARCS 2008 : 21st International Conference, Dresden, Germany, February 25-28, 2008. Proceedings

This book constitutes the refereed proceedings of the 21st International Conference on Architecture of Computing Systems, ...

اقرأ المزيد
978-1-84800-273-9
Codes: An Introduction to Information Communication and Cryptography

Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle ...

اقرأ المزيد
978-3-540-35482-6
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

اقرأ المزيد
978-0-387-36682-1
Cryptographic Algorithms on Reconfigurable Hardware

This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...

اقرأ المزيد
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
978-3-540-85053-3
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

اقرأ المزيد
978-3-030-34142-8
Cryptography Arithmetic : Algorithms and Hardware Architectures

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...

اقرأ المزيد
1119582423
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

اقرأ المزيد
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-540-77370-2
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

اقرأ المزيد
978-3-540-79104-1
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-72163-5
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

اقرأ المزيد
978-3-540-69141-9
Intersections de deux quadriques et pinceaux de courbes de genre 1 = Intersections of two quadrics and pencils of curves of genus 1

This research monograph focuses on the arithmetic, over number fields, of surfaces fibred into curves of genus 1 over the ...

اقرأ المزيد
978-3-540-27692-0
Introduction to Modern Number Theory

"Introduction to Modern Number Theory" surveys from a unified point of view both the modern state and the trends of continuing ...

اقرأ المزيد
عدد الكتب: 1 - 20 /34