221. Elliptic curves and their applications to cryptography : an introduction
Author: Enge, Andreas
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography,، Curves, Elliptic
Classification :
QA
76
.
9
.
A25E54


222. #Elliptic curves in cryptography
Author: #I.F. Blake, G. Seroussi, and N.P. Smart
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography ،Curves, Elliptic- Data processing
Classification :
#
QA
،#.
A25
,
B57


223. Elliptic curves in cryptography
Author: I. F. Blake, G. Seroussi, N. P. Smart
Library: Central library and Documentation Center (Zanjan)
Subject: ، Computer security,، Cryptography,، Curve, Elliptic - Data processing
Classification :
QA
76
.
9
.
A25
B27
1999


224. Elliptic curves in cryptography /
Author: I.F. Blake, G. Seroussi, N.P. Smart
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Curves, Elliptic-- Data processing,clé publique,courbe elliptique,cryptographie
Classification :
QA76
.
9
.
A25
B57
1999


225. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


226. Error-correcting codes, finite geometries and cryptography : Conference on Error-Control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada
Author: Aiden A. Bruen, David L. Wehlau, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25C63
2007


227. Error-correcting codes, finite geometries, and cryptography: Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
.
C6675
2007


228. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007


229. Foundations and applications of security analysis
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Formal methods (Computer science) ; Congresses. ; Cryptography ; Congresses. ;

230. Foundations and applications of security analysis
Author: / Pierpaolo Degano, Luca Vigan?o (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Formal methods (Computer science)--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
J65
,
2009


231. Foundations of cryptograph
Author: / Oded Goldreich
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computational complexity.
Classification :
QA
,
76
.
9
,.
A25
,
G635
,
2005


232. Foundations of cryptography
Author: / Oded Goldreich
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Computational complexity
Classification :
QA76
.
9
.
A25
,
G635
2005


233. Fundamentals of computer security
Author: Josef Pieprzyk
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security,Cryptography
Classification :
QA
،
76
.
9
،.
A25
,
P536
،
2003


234. Fundamentals of computer security
Author: Josef Pieprzyk, Thomas Hardjomo, Jennifer Seberry.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.
Classification :
QA76
.
9
.
A25
J674
2010


235. Fundamentals of computer security /
Author: Josef Pieprzyk
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Computer security,Cryptography
Classification :
QA76
.
9
.
A25
P536
2003


236. Fundamentals of computer security
Author: Pieprzyk, Josef
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25P536
2003


237. Fundamentals of computer security
Author: / Josef Pieprzyk
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security,Cryptography
Classification :
QA
76
.
9
.
A25P536
2003


238. Guide to Elliptic Curve Cryptography
Author: \ Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Public key cryptography.
Classification :
QA76
.
9
.
A25
H37
2003
E-book
,


239. Guide to elliptic curve cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Public key cryptography ;

240. Guide to elliptic curve cryptography /
Author: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Public key cryptography
Classification :
QA76
.
9
.
A25
H37
2003

