1. Advances in elliptic curve cryptography
Author: edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25A393


2. Advances in elliptic curve cryptography
Author: edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25
A375


3. Applied public key infrastructur
Author: / edited by Jianying Zhou ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I558
,
2005eb


4. Applied public key infrastructure :
Author: edited by Jianying Zhou ... [et al.].
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Public key infrastructure (Computer security),Public-key cryptography,Congresses.,Congresses.
Classification :
QA76
.
9
.
A25
I558
2005


5. Applied public key infrastructure :
Author: edited by Jianying Zhou [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
I558
2005eb


6. Applied public key infrastructure
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: key cryptography ; Congresses. ; -Public key infrastructure (Computer security) ; Congresses. ; Public

7. #Beginning cryptography with Java
Author: #David Hook
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography ،Public key infrastructure )Computer security( ،Java )Computer program language(
Classification :
#
QA
،#.
A25
H645


8. Beginning cryptography with Java
Author: / David Hook
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
Classification :
005
.
8
H781B
2005


9. Beginning cryptography with Java
Author: / David Hook
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
Classification :
QA76
.
9
.
A25
,
H645
2005


10. Cryptanalysis of RSA and its variants
Author: / M. Jason Hinek
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Telecommunication--Security measures--Mathematics,Public key cryptography.,Computer security.
Classification :
TK5102
.
94
.
H56
2010


11. Cryptography and network security
Author: / by William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
59
.
S713
2008


12. Guide to Elliptic Curve Cryptography
Author: \ Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Public key cryptography.
Classification :
QA76
.
9
.
A25
H37
2003
E-book
,


13. Guide to elliptic curve cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Public key cryptography ;

14. Guide to elliptic curve cryptography /
Author: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Public key cryptography
Classification :
QA76
.
9
.
A25
H37
2003


15. Guide to elliptic curve cryptography
Author: Darrel Hankerson, Alfred Menezes, Scott Vanstone
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25H26


16. Guide to elliptic curve cryptography
Author: / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Public key cryptography
Classification :
QA76
.
9
.
A25
,
H37
2003


17. Guide to elliptic curve cryptography /
Author: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.,Hankerson, Darrel R.
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security.,Public key cryptography.
Classification :
QA76
.
9
.
A25
H37
2003


18. #Guide to elliptic curve cryptography
Author: #Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Public key cryptography
Classification :
#
QA
،#.
A25H37
،#
2010


19. Guide to elliptic curve cryptography
Author: / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Public key cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
H37
,
2003


20. Guide to elliptic curve cryptography ]electronic resources[
Author: Hankerson, Darrel R.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
H37
2003

