Books on the topic 'Cryptographes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cryptographes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Sokolov, Artem, and Oleg Zhdanov. Cryptographic constructions on the basis of functions of multivalued logic. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1045434.
Full textUnited States. National Security Agency/Central Security Service. Center for Cryptologic History, ed. The Friedman legacy: A tribute to William and Elizebeth Friedman. 3rd ed. The Center, 2006.
Find full textF, Friedman William. The Friedman legacy: A tribute to William and Elizebeth Friedman. The Center, 1992.
Find full textChurchhouse, R. F. Codes and ciphers: Julius Caesar, the Enigma, and the internet. Cambridge University Press, 2002.
Find full textStinson, Douglas R., and Maura B. Paterson. Cryptography. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781315282497.
Full textRubinstein-Salzedo, Simon. Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8.
Full textLevy, Steven. Crypto: How the code rebels beat the government-saving privacy in the digital age. Viking, 2001.
Find full textB, Rowlett Frank. The story of MAGIC: Memoirs of an American cryptologic pioneer. Aegean Park Press, 1998.
Find full textKoç, Çetin Kaya, ed. Cryptographic Engineering. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71817-0.
Full textDong, Ling, and Kefei Chen. Cryptographic Protocol. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24073-7.
Full textHorváth, Máté, and Levente Buttyán. Cryptographic Obfuscation. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.
Full textMartin, Keith M. Cryptographic Applications. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0012.
Full textMartin, Keith M. Control of Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0014.
Full textMartin, Keith M. Cryptography for Personal Devices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0013.
Full textAdvanced Military Cryptography (Cryptographic Series , No 8). Aegean Park Press, 1996.
Find full textF, Friedman William. Elementary Military Cryptography (Cryptographic Series , No 7). Aegean Park Pr, 1996.
Find full textGivierge, Marcel. Course in Cryptography (Cryptographic Series , No 19). Aegean Park Press, 1996.
Find full textPublishing, Sunshine. Look at Me Loving Cryptography and Shit: Funny Notebook for Cryptography Lovers / Cryptographers, Christmas / Birthday / Appreciation / Thank You Gag Gift for Cryptography Lovers / Cryptographers. Independently Published, 2020.
Find full textMartin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.
Full textMartin, Keith. Everyday Cryptography. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001.
Full textFagone, Jason. The woman who smashed codes: A true story of love, spies, and the unlikely heroine who outwitted America's enemies. 2017.
Find full textF, Friedman William. Six Lectures Concerning Cryptography and Cryptanalysis (Cryptographic Series , No. 67). Aegean Park Pr, 1996.
Find full textCryptography Cryptography Cryptography Cryptography. Independently Published, 2018.
Find full textDanesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.
Find full textDanesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.
Find full textDanesi, Marcel. Cryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.
Find full textCryptographic Crimes: The Use of Cryptography in Real and Fictional Crimes. Lang AG International Academic Publishers, Peter, 2017.
Find full textBos, Joppe, and Martijn Stam, eds. Computational Cryptography. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108854207.
Full textChurchhouse, R. F. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, 2001.
Find full textChurchhouse, R. F. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, 2009.
Find full textChurchhouse, R. F. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, 2005.
Find full textDiepenbroek, Martine. The Spartan Scytale and Developments in Ancient and Modern Cryptography. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781350281301.
Full textFagone, Jason. Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies. HarperCollins Publishers, 2017.
Find full textDavid, Kahn. The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of American Codebreaking. Yale University Press, 2004.
Find full textFagone, Jason. The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies. HarperCollins Publishers and Blackstone Audio, 2017.
Find full textCoutinho, S. C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. AK Peters, Ltd., 1998.
Find full text