Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara. The first conference in this series, CRYPTO 81, organized by A. Gersho, did not have a formal proceedings. The proceedings of the following four conferences in this series have been published as: Advances in Cryptology: Proceedings of Crypto 82, D. Chaum, R. L. Rivest, and A. T. Sherman, eds., Plenum, 1983. Advances in Cryptology: Proceedings of Crypto 83, D. Chaum, ed., Plenum, 1984. Advances in Cryptology: Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Computer Science #196, Springer, 1985. Advances in Cryptology - CRYPTO '85 Proceedings, H. C. Williams, ed., Lecture Notes in Computer Science #218, Springer, 1986. A parallel series of conferences is held annually in Europe. The first of these had its proceedings published as Cryptography: Proceedings, Burg Feuerstein 1982, T. Beth, ed., Lecture Notes in Computer Science #149, Springer, 1983.
cryptologie --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- cryptografie --- Information systems --- 681.3*E3 --- Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Access control --- Congresses --- Accès --- Contrôle --- Congrès --- Data encryption (Computer science). --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security
Choose an application
Cryptography --- Cryptography. --- 681.3*E3 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Coding theory. --- Codage. --- Codage --- Cryptographie
Choose an application
Cryptography. --- Ciphers. --- Cryptographie --- Chiffres (Cryptographie) --- Ciphers --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Data encryption (Computer science) --- Codes --- Contractions --- Abbreviations --- Code names
Choose an application
Number theory. --- Cryptography. --- Number Theory --- Nombres, Théorie des --- Théorie des nombres --- Cryptography --- Number theory --- #TELE:SISTA --- 519.72 --- 519.72 Information theory: mathematical aspects --- Information theory: mathematical aspects --- Number study --- Numbers, Theory of --- Algebra --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- cryptografie --- Cryptographie --- Nombres, Théorie des. --- Cryptographie. --- Nombres, Théorie des.
Choose an application
51-8 --- Mathematical recreations --- Mathematical puzzles --- Number games --- Recreational mathematics --- Recreations, Mathematical --- Puzzles --- Scientific recreations --- Games in mathematics education --- Magic squares --- Magic tricks in mathematics education --- 51-8 Mathematical games and recreations --- Mathematical games and recreations --- Ciphers --- Cryptography --- Geometry --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Data encryption (Computer science) --- Codes --- Contractions --- Abbreviations --- Code names --- Famous problems in geometry --- Problems, Famous, in geometry --- Famous problems --- Problems, Famous --- Geometry - Famous problems
Listing 1 - 5 of 5 |
Sort by
|