101. Advances in cryptology-EUROCRYPT 2003: international conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4-8, 2003 : proceedings
Author: Eli Biham
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Congresses ، Cryptography,Security measures -- Congresses ، Data transmission systems
Classification :
QA
76
.
L28
Vol
.
2656


102. Advances in cryptology: EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 2006: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computers-- Access control,Congresses ، Cryptography,Congresses ، Data transmission systems-- Security measures
Classification :
QA
76
.
9
.
A25
.
E964
2006


103. Advances in cryptology -- EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005 : proceedings
Author: Ronald Cramer )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Congresses ، Cryptography,Security measures -- Congresses ، Data transmission systems
Classification :
QA
76
.
L28
Vol
.
3494


104. Advances in cryptology-EUROCRYT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
Author: Lars Knudsen )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Congresses ، Cryptography,Security measures -- Congresses ، Data transmission systems
Classification :
QA
76
.
L28
Vol
.
2332


105. Advances in cryptology-EUROCRYT 2001: international conference on the theory and applications of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computers-- Access control,Congresses ، Cryptography,Congresses ، Data transmission systems-- Security measures
Classification :
QA
76
.
9
.
A25
.
E964
2001


106. Advances in cryptology - Eurocrypt 2011
Author: Kenneth G. Paterson (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control, Congresses.,Cryptography, Congresses.,Data transmission systems-- Security measures, Congresses.

107. Advances in cryptology, 1981-1997 : electronic proceedings and index of the CRYPTO and EUROCRYPT Conference, 1981-1997
Author: Kevin S. McCurley, Claus Dieter Ziegler )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1440


108. Advances in cyber security :
Author: Kuan-Ching Li, Xiaofeng Chen, Willy Susilo, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer security.
Classification :
QA76
.
9
.
A25
A28
2018


109. Advances in data and information sciences :
Author: Mohan L. Kolhe, Munesh C. Trivedi, Shailesh Tiwari, Vikash Kumar Singh, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer engineering, Congresses.,Software architecture, Congresses.,Artificial intelligence.,Computer engineering.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Software architecture.
Classification :
QA76
.
751


110. Advances in decision sciences, image processing, security and computer vision :
Author: editors, Suresh Chandra Satapathy, K. Srujan Raju, K. Shyamala, D. Rama Krishna and Margarita N. Favorskaya.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Engineering, Congresses.,Engineering.
Classification :
TA5


111. Advances in elliptic curve cryptography
Author: edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25A393


112. Advances in elliptic curve cryptography
Author: edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25
A375


113. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011


114. Advances of DNA computing in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;

115. Alan Turing :
Author: Andrew Hodges ; [with a foreword by Douglas Hofstadter and a new preface by the author].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Turing, Alan Mathison,1912-1954.,Mathematicians-- Great Britain, Biography.
Classification :
QA29
.
T8
H63
2014


116. Alan Turing :
Author: Andrew Hodges ; foreword by Douglas Hofstadter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Turing, Alan,1912-1954.,Turing, Alan Mathison / 1912-1954.,Turing, Alan,1912-1954,Mathematicians-- Great Britain, Biography.,Artificial intelligence.,BIOGRAPHY & AUTOBIOGRAPHY-- Science & Technology.,Coding theory & cryptology.,COMPUTERS-- History.,Matematiker.,Mathematicians-- Great Britain, Biography.,Mathematicians.,MATHEMATICS-- History & Philosophy.,Second World War.,Great Britain., 7
Classification :
QA29
.
T8
H63
2012eb


117. Algebraic aspects of the Advanced encryption standard /
Author: by Carlos Cid, Sean Murphy, Matthew Robshaw.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Standards.,Computers-- Access control-- Standards.,Data encryption (Computer science)-- Standards.,Computer security-- Standards.,Computer security-- Standards.,Computers-- Access control-- Standards.,Computers-- Access control-- Standards.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science)-- Standards.,Informatique.
Classification :
QA76
.
9
.
A25
C43
2006eb


118. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43
J693


119. Algorithmic cryptanalysis
Author: / Antoine Joux
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer algorithms,Cryptography
Classification :
005
.
82
J86A
2009


120. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43J68

