|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Pieprzyk, Josef.
Publication:
. XVI, 311 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Özbudak, Ferruh.
Publication:
. XII, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Lin, Dongdai.
Publication:
. XII, 313 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2011
by Preneel, Bart.
Publication:
. XIV, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptology and Network Security
by Heng, Swee-Huay.
Publication:
. XIII, 355p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Hasan, M. Anwar.
Publication:
. 280p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
High Performance Networking, Computing, and Communication Systems
by Wu, Yanwen.
Publication:
. XV, 617 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The LLL Algorithm
by Nguyen, Phong Q.
Publication:
. XIV, 496 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|