Top 1200 applied cryptography schneier PDF Book Page 17

book image

Applied Physics - kishorekaruppaswamy

506 Pages
·2008
·32.47 MB

book image

Gröbner Bases, Coding, and Cryptography

Massimiliano Sala (auth.), Massimiliano Sala, Shojiro Sakata, Teo Mora, Carlo Traverso, Ludovic Perret (eds.)
·426 Pages
·2009
·4.384 MB

book image

Bent Functions: Results and Applications to Cryptography

Natalia Tokareva
·204 Pages
·2015
·2.645 MB

book image

Secret Key Cryptography

Frank Rubin
·2022
·11.354 MB

book image

Cryptography. Cracking Codes

Britannica Educational Publishing,Rob Curley
·2013
·4.196 MB

book image

Post-Quantum Cryptography

Bernstein D.J., Buchmann J., Dahmen E. (eds.)
·248 Pages
·2008
·1.963 MB

book image

Coding and Cryptography

Tom W. Körner
·104 Pages
·2014
·0.638 MB

book image

Introduction to Cryptography

Johannes A. Buchmann (auth.)
·285 Pages
·2001
·11.371 MB

book image

Embedded Cryptography 1 (ISTE Invoiced)

Emmanuel Prouff
·2025
·27 MB

book image

Encyclopedia of cryptography and security

van Tilborg H.C.A.
·697 Pages
·2005
·6.603 MB

book image

Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings

Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
·200 Pages
·2019
·6.812 MB

book image

CRYPTOGRAPHY: A Very Short Introduction

Fred Piper, Sean Murphy
·155 Pages
·2014
·0.8858 MB

book image

Quantum Cryptography and the Future of Cyber Security

Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
·2020
·36.128 MB

book image

Modern Cryptography Primer Theoretical Foundations and Practical Applications

Kościelny, Czesław; Kurkowski, Mirosław; Srebrny, Marian et al.
·246 Pages
·2013
·3.945 MB

book image

Communications and Cryptography: Two Sides of One Tapestry

G. B. Agnew (auth.), Richard E. Blahut, Daniel J. Costello Jr., Ueli Maurer, Thomas Mittelholzer (eds.)
·472 Pages
·1994
·14.214 MB

book image

Security for Wireless Sensor Networks using Identity-Based Cryptography

Patil, H.K. and Szygenda, S.A.
·230 Pages
·2012
·3.064 MB

book image

Applied Analysis

Cornelius Lanczos
·559 Pages
·2010
·13.647 MB

book image

Applied Predictive Modeling

Max Kuhn
·796 Pages
·2013
·15.73 MB

1
161718
50