• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۷۳ پاسخ غیر تکراری از ۱۷۶ پاسخ تکراری در مدت زمان ۰,۴۲ ثانیه یافت شد.

121. Introduction to cryptography

پدیدآورنده : Johannes Buchmann

موضوع : Coding theory,Cryptography

۳ نسخه از این کتاب در ۳ کتابخانه موجود است.

122. Introduction to cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Buchmann, Johannes

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Coding theory,، Cryptography

Classification :
QA
268
.
B82I5
2004

123. Introduction to cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Buchmann, Johannes.

Library: Central Library and Documentation Center (Kerman)

Subject: ، Coding theory,، Cryptography

Classification :
QA
268
.
B83
2001

124. Introduction to cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Buchmann, Johannes

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Coding theory,، Cryptography

Classification :
QA
268
.
B82I5

125. Introduction to cryptography : with coding theory

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Trappe, Wade

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Coding theory,، Cryptography

Classification :
QA
268
.
T72I5
2006

126. Introduction to cryptography with mathematical foundations and computer implementations

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Alexander Stanoyevitch

Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)

Subject: Coding theory,Cryptography -- Data processing,Cryptography--Mathematics.,Data encryption (Computer science)

Classification :
QA
268
.
S73
2011

127. Introduction to cryptography with mathematical foundations and computer implementations

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alexander Stanoyevitch

Library: Vali Asr University Central Library (Kerman)

Subject: Coding theory,Cryptography--Data processing,Cryptography--Mathematics,Data encryption )Computer science(

Classification :
QA
268
.
S73
2011

128. Introduction to cryptography with mathematical foundations and computer implementations

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stanoyevitch, Alexander.,Alexander Stanoyevitch

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Coding theory,Data processing ، Cryptography,Mathematics ، Cryptography,، Data encryption )Computer science(

Classification :
QA
268
.
S73C8

129. Introductory to cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Johannes Buchmann

Library: Central Library and Document Center of Arak University (Markazi)

Subject: Coding theory,cryptography.

Classification :
003
.
54
B928i

130. Mathematical methods in computer science

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: ; Computer science ; Mathematics. ; Quantum computers. ; Cryptography. ; Coding theory. ; -Beth, Thomas, ; 1949

Classification :

131. Mathematical methods in computer science

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jacques Calmet, Willi Geiselmann, Jeorn Meuller-Quade, (eds.

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Beth, Thomas,--1949,Computer science--Mathematics,Quantum computers.,Cryptography.,Coding theory.

Classification :
QA
,
76
.
9
,.
M35
,
M384
,
2008

132. Mathematical methods in computer science. essays in memory of Thomas Beth

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jacques Calmet, Willi Geiselmann, Jorn Muller-Quade, )eds.(

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer science- Mathematics,، Quantum computers,، Cryptography,، Coding theory,، Beth, Thomas, 9491-

Classification :
QA
76
.
9
.
M35
M384
2008

133. Mathematics of public key cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Steven D. Galbraith

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory,Cryptography-- Mathematics

Classification :
QA268
.
G35
2012

134. Number-theoretic methods in cryptology :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.

Classification :
QA76
.
9
.
A25
N88
2017

135. Practical cryptography :algorithms and implementations using C++

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Saiful Azad, Al-Sakib Khan Pathan

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography

Classification :
QA
76
.
9
.
A25
P725

136. Probabilistic and statistical methods in cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Daniel Neuenschwander

Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)

Subject: Coding theory,Cryptography -- Statistical methods,Cryptography -- Computer simulation,Cryptography -- Mathematics,Ciphers.

Classification :
QA
268
.
N48
2004

137. Probabilistic and statistical methods in cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Daniel Neuenschwander

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Coding theory.,Cryptography--Statistical methods,Cryptography--Computer simulation,Cryptography--Mathematics,Ciphers.

Classification :
QA
,
268
,.
N48
,
2004
Z
,
103
,.
N48
,
2004

138. Probabilistic and statistical methods in cryptology: an introduction by selected topics

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Neuenschwander, Daniel

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Coding theory,Statistical methods ، Cryptography,Computer simulation ، Cryptography,Mathematics ، Cryptography,، Ciphers

Classification :
QA
268
.
N48

139. Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: /editors, Yongqing Li ... [et al.].

Library: Library of College of Science University of Tehran (Tehran)

Subject: Coding theory,Cryptography,Number theory,Computer security,Congresses.,Congresses.,Congresses.,Congresses.

Classification :
QA268
.
I59
2007

140. Quantum communications and cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Alexander V. Sergienko

Library: (Semnan)

Subject: Security measures ، Quantum communication,، Cryptography,، Coding theory,، Data encryption )Computer science(,، Quantum communication

Classification :
TK
5102
.
94
.
Q83
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival