-
1Published in Springer eBooks (2013)Table of Contents: “... assumptions used in cryptography....”
Get full text
Перейти в каталог НБ ТГУ
eBook -
2
-
3
-
4
-
5
-
6“...Information Security and Cryptography, Texts and Monographs,...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
7
-
8
-
9
-
10Table of Contents: “...Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
11Published in Springer eBooks (2015)Table of Contents: “...Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20