1. Coding and cryptology: proceedings of ... 11- 15 June 2007
Author: Internationa workshop on Coding and cryptology (1st: 2007: Wuyi Mountains, China)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Coding theory- Congresses ► Cryptography- Congresses ► Number theory- Congresses ► Computer security- Congresses
Classification :
I61c

2. Coding and cryptology: proceedings of ... 11- 15 June 2007
Author: Internationa workshop on Coding and cryptology (1st: 2007: Wuyi Mountains, China)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Coding theory- Congresses ► Cryptography- Congresses ► Number theory- Congresses ► Computer security- Congresses
Classification :
I61c

3. Coding and cryptology: proceedings of ... 11- 15 June 2007
Author: Internationa workshop on Coding and cryptology (1st: 2007: Wuyi Mountains, China)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Coding theory- Congresses ► Cryptography- Congresses ► Number theory- Congresses ► Computer security- Congresses
Classification :
I61c

4. Coding and cryptology: proceedings of ... 11- 15 June 2007
Author: Internationa workshop on Coding and cryptology (1st: 2007: Wuyi Mountains, China)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Coding theory- Congresses ► Cryptography- Congresses ► Number theory- Congresses ► Computer security- Congresses
Classification :
I61c

5. Coding and cryptology: proceedings of ... 11- 15 June 2007
Author: Internationa workshop on Coding and cryptology (1st: 2007: Wuyi Mountains, China)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Coding theory- Congresses ► Cryptography- Congresses ► Number theory- Congresses ► Computer security- Congresses
Classification :
I61c

6. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017


7. Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Author: /editors, Yongqing Li ... [et al.].
Library: Library of College of Science University of Tehran (Tehran)
Subject: Coding theory,Cryptography,Number theory,Computer security,Congresses.,Congresses.,Congresses.,Congresses.
Classification :
QA268
.
I59
2007

