|
|
Результат поиска |
Поиск книг, содержащих: Public key
Книга | Страницы для поиска | Кормен Т., Лейзерсон Ч., Ривест Р. — Алгоритмы: построение и анализ | 759 | Khosrowpour M. — Encyclopedia Of Information Science And Technology | 1966 | Graham R.L., Grotschel M., Lovasz L. — Handbook of combinatorics (vol. 1) | 2030, 2032 | Graham R.L., Grotschel M., Lovasz L. — Handbook of combinatorics (vol. 2) | 2030, 2032 | Konheim A.G. — Computer Security and Cryptography | 337—340, 354 | Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | | Everest G., Ward T. — An Introduction to Number Theory | 251 | Jones J.A., Jones J.M. — Elementary Number Theory | 95 | von zur Gathen J., Gerhard J. — Modern computer algebra | 14, 15, 477, 483, 549, 551—553, 555, 557 | Brookshear J.G. — Computer Science: An Overview | 201, 530 | Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography | 1, 3 | Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography | 1, 3 | Weiss J. — Java Cryptography Extensions: Practical Guide for Programmers | 67 | Stinson D.R. — Cryptography: Theory and practice | 161 | Brookshear J. — Computer Science | 201, 530 | Feuerstein S., Pribyl B. — Oracle PL-SQL programming | 923 | Goebel A., Ritthaler D. — SAP Enterprise Portal: Technology and Programming | 254 | Coutinho S. — The mathematics of ciphers: number theory and RSA cryptography | 3, 163—164, 172 | Adámek J. — Foundations of Coding | 303 |
|
|