281. Introduction to cryptography: with coding theory
Author: / Wade Trappe, Lawrence C. Washington
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: نظریه کدگذاری,رمزنگاری
Classification :
QA
۲۶۸
/
ت
۴
الف
۹ ۱۳۸۱


282. Introduction to cryptography : with coding theory
Author: Wade Trappe, Lawrence C. Washington
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Coding theory,، Cryptography
Classification :
QA
268
.
T72I5
2006


283. Introduction to cryptography with mathematical foundations and computer implementations
Author: / Alexander Stanoyevitch
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Coding theory,Cryptography -- Data processing,Cryptography -- Mathematics,Data encryption (Computer science)
Classification :
QA268
.
S73C8


284. Introduction to cryptography with mathematical foundations and computer implementations
Author: / Alexander Stanoyevitch
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Coding theory,Cryptography -- Data processing,Cryptography--Mathematics.,Data encryption (Computer science)
Classification :
QA
268
.
S73
2011


285. Introduction to cryptography with mathematical foundations and computer implementations
Author: Alexander Stanoyevitch
Library: Vali Asr University Central Library (Kerman)
Subject: Coding theory,Cryptography--Data processing,Cryptography--Mathematics,Data encryption )Computer science(
Classification :
QA
268
.
S73
2011


286. Introduction to the Theory of Quantum Information Processin
Author: / by J??nos A. Bergou, Mark Hillery
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Physics,Coding theory,Quantum theory,Electronic books
Classification :
E-BOOK

287. Introductory to cryptography
Author: / Johannes Buchmann
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Coding theory,cryptography.
Classification :
003
.
54
B928i


288. Lecture notes on cryptography
Author: Goldwasser, Shafi
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Coding theory►Cryptography
Classification :
268
.
G6

289. Linear algebra and probability for computer science applications /
Author: Ernest Davis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algebras, Linear,Computer science-- Mathematics,Probabilities
Classification :
QA76
.
9
.
M35
D38
2012


290. Making, breaking codes :
Author: Paul Garrett
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory
Classification :
QA268
.
G37
2001


291. Mathematical foundations of quantum information and computation and its applications to nano- and bio-systems
Author: Ohya, Masanori
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Quantum theory,، Quantum computers,، Nanotechnology,، SCIENCE / Physics / Quantum Theory
Classification :
QC
173
.
96
.
M37
2011


292. Mathematical foundations of quantum information and computation and its applications to nano- and bio-systems /
Author: Masanori Ohya, Igor Volovich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Nanotechnology.,Quantum computers.,Quantum theory.,Astronomie.,Nanotechnology.,Physique.,Quantum computers.,Quantum theory.,SCIENCE-- Physics-- Quantum Theory.
Classification :
QC174
.
17
.
M35
O39
2011


293. Mathematical methods in computer science
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: ; Computer science ; Mathematics. ; Quantum computers. ; Cryptography. ; Coding theory. ; -Beth, Thomas, ; 1949

294. Mathematical methods in computer science
Author: / Jacques Calmet, Willi Geiselmann, Jeorn Meuller-Quade, (eds.
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Beth, Thomas,--1949,Computer science--Mathematics,Quantum computers.,Cryptography.,Coding theory.
Classification :
QA
,
76
.
9
,.
M35
,
M384
,
2008


295. Mathematical methods in computer science. essays in memory of Thomas Beth
Author: Jacques Calmet, Willi Geiselmann, Jorn Muller-Quade, )eds.(
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer science- Mathematics,، Quantum computers,، Cryptography,، Coding theory,، Beth, Thomas, 9491-
Classification :
QA
76
.
9
.
M35
M384
2008


296. Mathematical principles of the Internet.
Author: Nirdosh Bhatnagar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science-- Mathematics.,Internet-- Mathematical models.,Internetworking (Telecommunication)-- Mathematics.,Computer science-- Mathematics.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Information Theory,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Internet-- Mathematical models.,MATHEMATICS / General,MATHEMATICS / Number Systems
Classification :
TK5102
.
83


297. Mathematics of public key cryptography /
Author: Steven D. Galbraith
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory,Cryptography-- Mathematics
Classification :
QA268
.
G35
2012


298. Modern cryptography and elliptic curves :
Author: Thomas R. Shemanske.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Textbooks.,Curves, Elliptic, Textbooks.,Geometry, Algebraic, Textbooks.,Algebraic geometry-- Arithmetic problems. Diophantine geometry-- Applications to coding theory and cryptography.,Computer science-- Instructional exposition (textbooks, tutorial papers, etc.),Computer science-- Theory of data-- Data encryption.,Computersicherheit,Cryptography.,Curves, Elliptic.,Elliptische Kurve,Geometry, Algebraic.,Information and communication, circuits-- Communication, information-- Cryptography.,Kryptologie,Number theory-- Arithmetic algebraic geometry (Diophantine geometry)-- Elliptic curves over global fields.,Number theory-- Computational number theory-- Factorization.,Number theory-- Elementary number theory-- Elementary number theory.,Number theory-- Finite fields and commutative rings (number-theoretic aspects)-- Algebraic coding theory; cryptography.,Number theory-- Instructional exposition (textbooks, tutorial papers, etc.),Public-Key-Kryptosystem,Quantencomputer,Quantum theory-- Axiomatics, foundations, philosophy-- Quantum computation.
Classification :
QA567
.
2
.
E44
S534
2017


299. Number Theory in Science and Communication :
Author: by Manfred R. Schroeder.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Mathematics.,Number theory.

300. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017

