Books on the topic 'Data encryption (Computer science) Polynomials'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data encryption (Computer science) Polynomials.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Brute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.
Find full textSerdar, Pehlivanoglu, and SpringerLink (Online service), eds. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.
Find full textHeld, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Find full textSmith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textLek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.
Find full textSalomon, David. Data Compression: The Complete Reference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.
Find full textStorer, James A. An Introduction to Data Structures and Algorithms. Boston, MA: Birkhäuser Boston, 2002.
Find full textBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Find full textJan, Pelzl, ed. Understanding cryptography: A textbook for students and practitioners. Heidelberg: Springer, 2010.
Find full text1965-2004, Bartolini Franco, ed. Watermarking systems engineering: Enabling digital assets security and other applications. New York: Marcel Dekker, 2004.
Find full textSpendolini, Scott. Expert Oracle Application Express Security. Berkeley, CA: Apress, 2013.
Find full textXu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. IBM system storage tape encryption solutions. 3rd ed. [Pougkeepsie, NY]: International Technical Support Organization, 2009.
Find full textKoskinen, Jukka Antero. Knapsack sets for cryptography. Lappeenranta, Finland: Lappeenranta University of Technology, 1994.
Find full textEli, Biham, and Youssef Amr M, eds. Selected areas in cryptography: 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers. Berlin: Springer, 2007.
Find full textChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1988.
Find full textMenezes, Alfred J. Advances in Cryptology-CRYPT0' 90: Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1991.
Find full textBrassard, Gilles. Advances in Cryptology -- CRYPTO' 89 Proceedings. New York, NY: Springer-Verlag Berlin Heidelberg, 1990.
Find full textMcCurley, Kevin S. Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conferences 1981-1997. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1999.
Find full textLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Find full textIBM System i security: Protecting i5/OS data with encryption. [United States?]: IBM, International Technical Support Organization, 2008.
Find full textXu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.
Find full textGiovanni, Motta, ed. Handbook of data compression. 5th ed. London: Springer, 2010.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textSimovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.
Find full textSchulz, Ralph-Hardo. Codierungstheorie: Eine Einfu hrung. 2nd ed. Wiesbaden: Vieweg, 2003.
Find full textMcLoone, Máire. System-on-Chip Architectures and Implementations for Private-Key Data Encryption. Boston, MA: Springer US, 2003.
Find full textDesktop witness: The do's and don'ts of personal computer security. Chichester: John Wiley & Sons, 2002.
Find full textStavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Heidelberg: Springer, 2010.
Find full textTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Find full textKiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.
Find full textAlgebraic Aspects of the Advanced Encryption Standard (Advances in Information Security). Springer, 2006.
Find full textSerious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.
Find full textEncryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.
Find full textLibrary of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.
Find full textEveryday Cryptography Fundamental Principles And Applications. Oxford University Press, 2012.
Find full text