141. Selected Areas in Cryptography :
Author: edited by Lars R. Knudsen, Huapeng Wu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data protection.

142. Selected areas in cryptography :
Author: Alex Biryukov, Guang Gong, Douglas R. Stinson (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
S23
2011


143. Selected areas in cryptography -- SAC 2018 :
Author: Carlos Cid, Michael J. Jacobson Jr. (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


144. Solving German codes in World War I: ]with an added special" code problem" for the student[
Author: Friedman, William Frederick
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography,، European War, 4191- 8191-- Communications,، Ciphers
Classification :
Z
103
.
F876


145. Statistical methods in cryptanalyiss
Author: Kullback, Solomon
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography-- Statistical methods,، Ciphers
Classification :
Z
103
.
K84


146. Stream Cipher
Author: / by Andreas Klein
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Mathematics,Computational complexity,Algorithms,Electronic books
Classification :
E-BOOK

147. The American magic :
Author: Ronald Lewin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Chōsen Kōgei Kenkyūkai,University of South Alabama,World War, 1939-1945-- Cryptography.,World War, 1939-1945-- Japan.,World War, 1939-1945-- Pacific Ocean.,World War, 1939-1945-- Secret service-- United States.,Cryptography.,Geschichte,Magic,Pazifikkrieg,Secret service.,Spionage,Tweede Wereldoorlog.,Weltkrieg,Japan, History, 1912-1945.,Japan, History, 1912-1945.,Japan.,Japan.,Pacific Ocean.,United States.,USA., 0, 4, 7, 7, 7, 7, 7
Classification :
D810
.
C88
L48
1982


148. The History of codes and ciphers in the United States during World War I
پدیدآورنده :
موضوع : ، Cryptography,، Ciphers
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
149. <The> Mathematics of Secrets
Author: \ Joshua Holden
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Cryptography -- Mathematics,Ciphers,Computer security,رمزنگاری -- ریاضیات,رمز,امنیت کامپیوتر
Classification :
E-Book
,

150. The Voynich manuscrupt: an elegant enigma
Author: D'Imperio, M E
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Voynich manuscript,، Ciphers,، European War, 4191-8191-- Cryptography
Classification :
Z
105
.
5
.
V65
.
D55


151. The codebreakers :
Author: David Kahn.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography-- History.,Ciphers.,Cryptage.,Cryptographie-- Histoire.,Cryptography-- History.,Cryptography.,Geheimschrift.,Histoire.,Kryptologie
Classification :
Z103
.
K28
1996


152. The contributions of the cryptographic bureaus in the World War
Author: Glyden, Yves
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography-- Sweden,، Ciphers,، European War, 4191-8191-- Cryptography
Classification :
Z
103
.
G5


153. The history of codes and ciphers in the United States during the period between the World Wars Part 1.1919-1929
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography,، Ciphers
Classification :
Z
103
.
H577


154. The index of coincidence and its applications in cryptanalysis
Author: Friedman, William F.)William Frederick(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Ciphers,، Cryptography
Classification :
Z
104
.
F89
1987


155. The manga guide to cryptography /
Author: Masaaki Mitani, Shinichi Sato, Idero Hinoki, and Verte Corp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Graphic novels.,Public key cryptography, Comic books, strips, etc.,Telecommunication-- Security measures, Comic books, strips, etc.,Graphic novels.,Public key cryptography.,Telecommunication-- Security measures.
Classification :
TK5102
.
94
.
M5813
2018


156. The mathematics of ciphers: number theory and RSA cryptography
Author: Coutinho, S. C.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Number theory,، Cryptography
Classification :
QA
241
.
C69513
1999


157. Topics in cryptology -- CT-RSA 2019 :
Author: Mitsuru Matsui (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


158. Towards hardware-intrinsic security :
Author: Ahmad-Reza Sadeghi, David Naccache, editors ; foreword by Pim Tuyls.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer input-output equipment.,Computer input-output equipment.,Informatique.
Classification :
TK7887
.
5
.
T69
2010eb


159. Understanding cryptography :
Author: by Christof Paar, Jan Pelzl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography-- Mathematics.,Cryptography.,Data encryption (Computer science),Cryptography-- Mathematics.,Cryptography.,Data encryption (Computer science),Informatique.
Classification :
QA76
.
9
.
A25
P437
2009


160. User's guide to cryptography and standards /
Author: Alexander W. Dent, Chris J. Mitchell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Access control-- Standards,Cryptography-- Standards
Classification :
QA76
.
9
.
A25
D465
2005

