To see the other types of publications on this topic, follow the link: Cryptographie (Informatique).

Books on the topic 'Cryptographie (Informatique)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Cryptographie (Informatique).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Joe, Kilian, ed. Theory of cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Algèbre avec applications à l'algorithmique et à la cryptographie. Ellipses, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beckett, Brian. Introduction aux méthodes de la cryptologie. Masson, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klima, Richard E. Cryptology: Classical and modern with maplets. Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

An introduction to cryptology. Kluwer Academic Publishers, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Vuibert, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1968-, Blundo Carlo, and Cimato Stelvio, eds. Security in communication networks: 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cramer, Ronald John Fitzgerald. Modular design of secure yet practical cryptographic protocols. s.n., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

1969-, Boneh Dan, ed. Advances in cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003 : proceedings. Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Elbirt, Adam J. Understanding and applying cryptography and data security. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Complexity theory and cryptology: An introduction to cryptocomplexity. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

CHES 2010 (2010 Santa Barbara, Calif.). Cryptographic hardware and embedded systems-- CHES 2010: 12th international workshop, Santa Barbara, USA, August 17-20,2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Nessmann, Philippe. [Les chiffres et les lettres en 35 expériences]. Mango jeunesse, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Investigator's Guide to Steganography. Taylor and Francis, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Knudsen, Jonathan. Java cryptography. O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Java cryptography. O'Reilly, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Arto, Salomaa, Karhumäki J, Maurer Hermann A. 1941-, and Rozenberg Grzegorz, eds. Results and trends in theoretical computer science: Colloquium in honor of Arto Salomaa, Graz, Austria, June 10-11, 1994 : proceedings. Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Jaworski, Jamie. Java sécurité. CampusPress, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

A cryptography policy framework for electronic commerce : building Canada's information economy and society =: Politique cadre en matière de cryptographie aux fins du commerce électronique : pour une économie et une société de l'information au Canada. Industry Canada = Industrie Canada, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Introduction to cryptography with open-source software. CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Authentication systems for secure networks. Artech House, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Authentication codes and combinatorial designs. Taylor & Francis, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Stephen, Paine, and RSA Security, eds. RSA Security's official guide to cryptography. Osborne/McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cryptography Made Simple. Springer London, Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Cryptography Made Simple. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Smart, Nigel. Cryptography Made Simple. Springer International Publishing AG, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Beckett, Brian. Introduction aux méthodes de la cryptologie. Dunod, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Cryptology: Classical and Modern. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Klima, Richard E., and Neil P. Sigmon. Cryptology: Classical and Modern with Maplets. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Klima, Richard E., Neil Sigmon, Neil P. Sigmon, and Richard Klima. Cryptology: Classical and Modern. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Klima, Richard E., Neil Sigmon, Neil P. Sigmon, and Richard Klima. Cryptology: Classical and Modern. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

(Editor), Cetin K. Koc, and Christof Paar (Editor), eds. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings (Lecture Notes in Computer Science). Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Paar, Christof, and Cetin K. Koc. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

C# Data Security Handbook. Wrox Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Understanding and Applying Cryptography and Data Security. AUERBACH, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Elbirt, Adam J. Understanding and Applying Cryptography and Data Security. Auerbach Publishers, Incorporated, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kipper, Gregory. Investigator's Guide to Steganography. AUERBACH, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kipper, Gregory. Investigator's Guide to Steganography. Auerbach Publishers, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kipper, Gregory. Investigator's Guide to Steganography. Auerbach Publishers, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kipper, Gregory. Investigator's Guide to Steganography. Taylor & Francis Group, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

(Editor), Bruce Christianson, Bruno Crispo (Editor), James A. Malcolm (Editor), and Michael Roe (Editor), eds. Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers (Lecture Notes in Computer Science). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Malcolm, James A., Michael Roe, Bruno Crispo, and Bruce Christianson. Security Protocols: 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Helleseth, Tor. Advances in Cryptology-Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 : Proceedi (Lecture Notes in Computer Science). Springer, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves. McGraw-Hill, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Deka, Ganesh Chandra, and Suyel Namasudra. Advances of DNA Computing in Cryptography. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Advances of DNA Computing in Cryptography. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Deka, Ganesh Chandra, and Suyel Namasudra. Advances of DNA Computing in Cryptography. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!