Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Mathematical control systems --- cryptografie --- Curves, Elliptic --- Elliptic curves --- Coding theory --- 512.7 --- 519.72 --- 512.7 Algebraic geometry. Commutative rings and algebras --- Algebraic geometry. Commutative rings and algebras --- 519.72 Information theory: mathematical aspects --- Information theory: mathematical aspects --- Curves, Algebraic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Codage --- Courbes elliptiques
Choose an application
621.391.7 --- Computers --- -Cryptography --- 681.3*E3 --- 681.3*E3 Data encryption: data encryption standard DES public key cryptosystems --- Data encryption: data encryption standard DES public key cryptosystems --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- 621.391.7 Secret systems of electrical communication --- Secret systems of electrical communication --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Access control --- Public key cryptography --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Computer security --- Cryptography. --- Cryptographie
Choose an application
Computers --- Access control --- Congresses --- Cryptography --- Computers - Access control - Congresses. --- Cryptography - Congresses.
Choose an application
Engineering mathematics --- Finite fields (Algebra) --- Mathématiques de l'ingénieur --- Corps finis --- #TELE:SISTA --- Modular fields (Algebra) --- Algebra, Abstract --- Algebraic fields --- Galois theory --- Modules (Algebra) --- Engineering --- Engineering analysis --- Mathematical analysis --- Mathematics --- Engineering mathematics. --- Finite fields (Algebra). --- Mathématiques de l'ingénieur
Choose an application
Computers --- -Cryptography --- Access control --- -Congresses --- Congresses
Choose an application
Computers --- Cryptography --- Access control --- -Cryptography --- -005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- -Computers --- -519.76 --- 621.391.7 --- -681.3*D46 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Secret systems of electrical communication --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 621.391.7 Secret systems of electrical communication --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- 519.76 --- 681.3*D46 --- Access control&delete& --- Handbooks, manuals, etc --- Mathematical control systems --- Programming --- cryptografie --- Handbooks, manuals, etc. --- Ordinateurs --- Cryptographie --- Accès --- Contrôle --- Guides, manuels, etc. --- Guides, manuels, etc --- Computers - Access control - Handbooks, manuals, etc. --- Cryptography - Handbooks, manuals, etc.
Listing 1 - 6 of 6 |
Sort by
|