Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Jeffrey Hoffstein, Jill Pipher, J.H. Silverman. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics). – М.: , 2008. – 524 с. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Chethan Kumar M.,Chiranth Erappa and Umesh T. H. RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Santosh Kumar Yadav. Some Problems In Symmetric And Asymmetric Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Sahadeb Upretee. Cryptography: Origin to Recent Advancement. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. M. Amutha Prabakar. Authentication Scheme for Dynamic Group Using Threshold Cryptography. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Naveed Islam. Cryptography based Visual Data Protection. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Nivethaa Shree and Latha Parthiban. Elliptic Curve Cryptography for Digital Signature Authentication. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Дополнительные результаты Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Richard A. Mollin. RSA and Public-Key Cryptography. – М.: , 0. – 0 с. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с. Sean Geer. Essential Internet. – М.: , 0. – 0 с. Rolf Oppliger. Contemporary Cryptography (Artech House Computer Security503). – М.: , 2005. – 510 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. О.Н. Герман, Ю.В. Нестеренко. Теоретико-числовые методы в криптографии. – М.: Академия, 2012. – 272 с. Е.Б. Маховенко. Теоретико-числовые методы в криптографии. – М.: Гелиос АРВ, 2006. – 320 с. John & Liz Soars. Headway. Student's Book. Advanced. – М.: Oxford University Press, 2001. – 160 с. Jeffrey Hoffstein, Jill Pipher, J.H. Silverman. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics). – М.: , 2008. – 524 с. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с. N Chor. Two Issues in Public Key Cryptography – RSA bit Security & a new knapsack Type Syst. – М.: , 1986. – 0 с. Сонг Ян. Криптоанализ RSA. – М.: Регулярная и хаотическая динамика, Институт компьютерных исследований, 2011. – 312 с. Анара Баймагамбетова. Защита конфиденциальной информации на принципах кодировки. – М.: LAP Lambert Academic Publishing, 2015. – 84 с. Abhishek Roy,Sunil Karforma and Subhadeep Banik. Implementation Of Authentication In E-Governance–an Uml Based Approach. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Himani Agrawal and Monisha Sharma. Implementation and Analysis of various Encryption Techniques. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Chethan Kumar M.,Chiranth Erappa and Umesh T. H. RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Mehmet Oztemel. A Secure RFID ID-Card System Via Robust Image Hashing. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Jithra Adikari and Vassil Dimitrov. Speeding up Elliptic Curve Cryptosystems. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Martin Simka and Milos Drutarovsky. Selected Blocks for Public-Key Cryptosystems in FPGAs. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Francis Kintu. Mainstreaming HIV/AIDS in local government in Gauteng province, RSA. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. George Chipeta,Janneke Mostert and Daisy Jacobs. Teaching and Learning of IL in Universities of KZN, in RSA and Malawi. – М.: LAP Lambert Academic Publishing, 2011. – 184 с. M. Amutha Prabakar and Indrani B. Road Map on Password Based Authentication Schemes Using Smart Card. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Masoud A. Khoory,Musab Hamed Saeed and Abdulrahman M. Saleh. Assessment of apical leakage of different Endodontic Sealers. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Maged Hamada Ibrahim. Coercion Resistant Cryptosystems. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Andreas Helde. Noncommutative Grobner bases in Polly Cracker cryptosystems. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. ILIA TOLI. On Some Algebraic Methods in Cryptography. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. Santosh Kumar Yadav. Some Problems In Symmetric And Asymmetric Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Robert Mutyaba. Improving the RSA Cryptographic Algorithm. – М.: LAP Lambert Academic Publishing, 2010. – 84 с. Kondwani Magamba. Quintic Irreducible Binary Goppa Codes of Length 32. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Sahadeb Upretee. Cryptography: Origin to Recent Advancement. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Rajesh Pratap Singh. Permutation Polynomials and their Applications in Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. V. Vasu. Semirings applications. – М.: Scholars' Press, 2014. – 144 с. Sergey Nikolenko. Provably secure constructions in cryptography. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Nicholas Sylva Matloga and Lufuno Tokyo Nevondwe. Time-Barring and Prescription of Pension Funds Complaints in RSA. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Azia Ivo Nchendia. Barriers to ART adherence in Vredenburg, RSA. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Ivan Carr. The mediation of policy for Representative Council of Learners in RSA. – М.: LAP Lambert Academic Publishing, 2010. – 300 с. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Dmitry Khovratovich. New Methods in Symmetric Cryptanalysis. – М.: LAP Lambert Academic Publishing, 2011. – 220 с. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Ravinder Singh Mann. A Comparative Evaluation of Cryptographic Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Masahiro Yagisawa. Proposal for New Key Agreement Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. M. Amutha Prabakar. Authentication Scheme for Dynamic Group Using Threshold Cryptography. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Santosh Deshpande,Narasimha Ayachit and V. Kamakshi Prasad. Evolutionary Computing Based Cryptographic Key Management. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Satarupa Chakraborty,Subarna Laha and Ankana Dhar. GSM Security Using Elliptic Curve Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Shamiel Ebrahim. Digital Signature with RSA. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Ghada Abdelhady and Hussam Elbehiery. Multimodal Biometrics Cryptosystem using Elliptic Curve. – М.: LAP Lambert Academic Publishing, 2014. – 164 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Kester Quist-Aphetsi. A Novel Cryptographic Key-exchange Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Alina Matyukhina. Efficient Algorithm for divisibility discovery on recursive sequences. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Naveed Islam. Cryptography based Visual Data Protection. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Nivethaa Shree and Latha Parthiban. Elliptic Curve Cryptography for Digital Signature Authentication. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Mohamed Abd. El Hamid Ibrahim Moustafa El Bahtity. Cryptography using Dynamic Rotation. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Valerie Gauthier Umana. Post-Quantum Cryptography. – М.: Scholars' Press, 2014. – 200 с. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Matthieu Rivain. On the Physical Security of Cryptographic Implementations. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Branovic Irina. Instruction Set Extensions For Elliptic Curve Cryptography. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Martin Krisell. Elliptic Curve Digital Signatures in RSA Hardware. – М.: Scholars' Press, 2013. – 108 с. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Tamur Aziz. Intelligent Watermarking Using Loss Less Compression and RSA Encryption. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Jayaprakash Kar. Proxy Blind Multi-Signature Scheme. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Clainos Chidoko. Determinants of Intra-Industry Trade. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Leon Maluleke. Quality Management System Implemention in Government Department - RSA. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Даниил Предыдущие 2 работы после вашего сопровождения показали, что у вас очень хорошо получается, так что я думаю - особых проблем не должно возникнуть. Напишите какая стоимость вас устраивает. О программе узнаю в ближайшее время.