|
|
 |
| Результат поиска |
Поиск книг, содержащих: Public key
| Книга | Страницы для поиска | | Кормен Т., Лейзерсон Ч., Ривест Р. — Алгоритмы: построение и анализ | 759 | | Khosrowpour M. — Encyclopedia Of Information Science And Technology | 1966 | | Graham R.L., Grotschel M., Lovasz L. — Handbook of combinatorics (vol. 1) | 2030, 2032 | | Graham R.L., Grotschel M., Lovasz L. — Handbook of combinatorics (vol. 2) | 2030, 2032 | | Konheim A.G. — Computer Security and Cryptography | 337—340, 354 | | Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | | | Everest G., Ward T. — An Introduction to Number Theory | 251 | | Jones J.A., Jones J.M. — Elementary Number Theory | 95 | | von zur Gathen J., Gerhard J. — Modern computer algebra | 14, 15, 477, 483, 549, 551—553, 555, 557 | | Brookshear J.G. — Computer Science: An Overview | 201, 530 | | Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography | 1, 3 | | Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography | 1, 3 | | Weiss J. — Java Cryptography Extensions: Practical Guide for Programmers | 67 | | Stinson D.R. — Cryptography: Theory and practice | 161 | | Brookshear J. — Computer Science | 201, 530 | | Feuerstein S., Pribyl B. — Oracle PL-SQL programming | 923 | | Goebel A., Ritthaler D. — SAP Enterprise Portal: Technology and Programming | 254 | | Coutinho S. — The mathematics of ciphers: number theory and RSA cryptography | 3, 163—164, 172 | | Adámek J. — Foundations of Coding | 303 |
|
|