Digital catalogue


 

Choice of metadata Electronic Library

Page 1, Results: 2

Report on unfulfilled requests: 0


Roger, A. Grimes
    Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today’s Crypto [Electronic resource] / A. Grimes Roger. - Canada : Wiley, 2020. - 262 p. - Б. ц.

Рубрики: COMPUTERS

   CRYPTOGRAPHY


Кл.слова (ненормированные):
asymmetric -- equation -- encryption -- quantum -- wave

Roger, A. Grimes Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today’s Crypto [Electronic resource] / A. Grimes Roger, 2020. - 262 p.

1.

Roger, A. Grimes Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today’s Crypto [Electronic resource] / A. Grimes Roger, 2020. - 262 p.



Roger, A. Grimes
    Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today’s Crypto [Electronic resource] / A. Grimes Roger. - Canada : Wiley, 2020. - 262 p. - Б. ц.

Рубрики: COMPUTERS

   CRYPTOGRAPHY


Кл.слова (ненормированные):
asymmetric -- equation -- encryption -- quantum -- wave

32.973
A18

Achary, R.
    Cryptography and network security [Электронный ресурс] / R. Achary. - New Delhi : Mercury Learning and Information, 2021. - 652 p. - Б. ц.

Рубрики: ТЕХНИКА. ТЕХНИЧЕСКИЕ НАУКИ

   ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ


Кл.слова (ненормированные):
cryptography -- security needs -- security attacks -- security mechanisms -- conventional encryption -- message confidentiality -- symmetric key encrypion -- modern block ciphers -- asymmetric key encryption

Achary, R. Cryptography and network security [Электронный ресурс] / R. Achary, 2021. - 652 p.

2.

Achary, R. Cryptography and network security [Электронный ресурс] / R. Achary, 2021. - 652 p.


32.973
A18

Achary, R.
    Cryptography and network security [Электронный ресурс] / R. Achary. - New Delhi : Mercury Learning and Information, 2021. - 652 p. - Б. ц.

Рубрики: ТЕХНИКА. ТЕХНИЧЕСКИЕ НАУКИ

   ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ


Кл.слова (ненормированные):
cryptography -- security needs -- security attacks -- security mechanisms -- conventional encryption -- message confidentiality -- symmetric key encrypion -- modern block ciphers -- asymmetric key encryption

Page 1, Results: 2

 

All acquisitions for 
Or select a month