1. Algorithmic cryptanalysis
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer algorithms. ; Cryptography. ;

2. Algorithmic cryptanalysis
Author: / Antoine Joux
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer algorithms,Cryptography
Classification :
005
.
82
J86A
2009


3. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43
J693


4. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43J68


5. Algorithmic cryptanalysis
Author: / Antoine Joux
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer algorithms.,Cryptography.
Classification :
QA76
.
9
.
A43
,
J693
2009


6. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43
J65
2009


7. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43
J69
2009


8. Algorithmic cryptanalysis /
Author: Antoine Joux
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer algorithms,Cryptography
Classification :
QA76
.
9
.
A43
J693
2009


9. Algorithmic cryptanalysis
Author: / Antoine Joux
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer algorithms.,Cryptography.
Classification :
QA
,
76
.
9
,.
A43
,
J693
,
2009


10. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: (Semnan)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43J693
2009


11. Cryptographic Boolean functions and applications
Author: Cusick, Thomas W.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Algebra, Boolean,، Cryptography,، Data encryption )Computer science(,، Computer algorithms,، Electronic books
Classification :
QA
10
.
3
.
C87


12. Cryptographic Boolean functions and applications
Author: / Thomas W. Cusick and Pantelimon St?anic?a
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Algebra, Boolean.,Cryptography.,Data encryption (Computer science),Computer algorithms.
Classification :
QA
,
10
.
3
,.
C87
,
2009


13. Cryptographic Boolean functions and applications
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Algebra, Boolean. ; Cryptography. ; Data encryption (Computer science) ; Computer algorithms. ;

14. Non-commutative cryptography and complexity of group-theoretic problems
Author: Myasnikov, Alexei G., 5591-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Combinatorial group theory,، Cryptography,، Computer algorithms,، Number theory
Classification :
QA
182
.
5
.
M93N6


15. Non-commutative cryptography and complexity of group-theoretic problems /
Author: Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov ; with an appendix by Natalia Mosina
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Combinatorial group theory,Computer algorithms,Cryptography,Number theory
Classification :
QA182
.
5
.
M934
2011


16. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017

