121. Algorithmic cryptanalysis
Author: / Antoine Joux
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer algorithms.,Cryptography.
Classification :
QA76
.
9
.
A43
,
J693
2009


122. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43
J65
2009


123. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43
J69
2009


124. Algorithmic cryptanalysis /
Author: Antoine Joux
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer algorithms,Cryptography
Classification :
QA76
.
9
.
A43
J693
2009


125. Algorithmic cryptanalysis
Author: / Antoine Joux
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer algorithms.,Cryptography.
Classification :
QA
,
76
.
9
,.
A43
,
J693
,
2009


126. Algorithmic cryptanalysis
Author: Joux, Antoine
Library: (Semnan)
Subject: ، Computer algorithms,، Cryptography
Classification :
QA
76
.
9
.
A43J693
2009


127. Algorithmic game theory /
Author: edited by Noam Nisan ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algorithms,Game theory
Classification :
QA269
.
A43
2007


128. Algorithmic problems of group theory, their complexity, and applications to cryptography
Author: Delaram Kahrobaei, Vladimir Shpilrain, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Group theory,Congresses ، Noncommutative algebras,Congresses ، Algorithms,Congresses ، Cryptography,Congresses ، Data encryption )Computer science(,Congresses ، Algebra
Classification :
QA
176
.
A43


129. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :
Author: Jaime G Carbonell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:

130. Applied Cryptography and Network Security
Author: \ [Edited by] Steven M. Bellovin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

131. Applied Cryptography and Network Security
Author: / Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

132. Applied Cryptography and Network Security
Author: / Naini-Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

133. Applied Cryptography and Network Security
Author: \ Ioana Boureanu, Philippe Owesarski, Serge Vaudenay (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Systems and Data Security.,Data Encryption.,رمزگذاری دادهها
Classification :
E-Book
,

134. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگرهها,رمزگذاری دادهها -- کنگرهها,رمزنگاری -- کنگرهها
Classification :
E-Book
,

135. Applied Cryptography and Network Security
Author: \ [Edited by] Michel Abdalla...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

136. Applied Cryptography and Network Security
Author: / Jianying Zhou, Moti Yung
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

137. Applied Cryptography and Network Security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

138. Applied Cryptography and Network Security
Author: / Javier Lopez, Gene Tsudik
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

139. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Computer networks -- Security measures -- Congresses,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

140. Applied Cryptography and Network Security
Author: \ Jianying Zhou, MotiYung (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
