Collection of books on cryptography, quantum cryptography

Pay with:
i agree with "Terms for Customers"
Sold: 1 last one 27.04.2014
Refunds: 0

Uploaded: 16.04.2014
Content: text 59 symbols

Product description

In this distribution presentation of the book and articles on cryptography, quantum cryptography, cryptology.
IMPORTANT - The folder structure:
\u003cBASE\u003e - Contains basic documentation of the collection at the time of distribution.
\u003cSOFT\u003e - It contains a rare software needed for opening files.
<#N Ussue - DD.MM.YYYY> - the folder have an update on the date DD.MM.YYYY, #N number of updates.
At the root of the file describing the content KATALOG.doc.
PS: do not run Sider
Folder \u003cBASE\u003e (Folder) Quantum crypto
A Quantum Leap for Cryptography.pdf
A quick glance at quantum cryptography - Lomonaco SJdjvu
Plug and Play quantum cryptography.pdf
Quantum cryptography (2002) - group of applied phyzics.pdf
Quantum cryptography (2004) - group of applied phyzics.pdf
Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf
(Subfolder quantum crypto) Articles:
Quantum key distribution over 67 km with a plug & play system.pdf
The algorithm is a common key using a quantum channel svyazi.pdf
Quantum cryptography - Krasavin.doc
Quantum cryptography - Semenov.doc
Quantum kriptografiya- expensive toy or a technology of the future - Vinokurov.doc
Quantum kriptografiya- basis for development and information obespechenie.pdf
On the instability of quantum cryptography - Gorshkov.doc
On one approach to constructing quantum codes II.pdf
On one approach to constructing quantum kodov.pdf
What's wrong with the classic kriptografiey.mht
(Folder) Cryptography
A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf
A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf
A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu
Advances in Cryptology. CRYPTO 2004. 24th Annual International Cryptology Conference (2004) - Spr.pdf
Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf
Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf
BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu
Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf
Coding and Cryptography (1998) - Korner.pdf
Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf
Contemporary Cryptography (2005) - Artech House.pdf
Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998) .pdf
Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf
Cryptographic Security. Architecture, Design and Verification - Springer.pdf
Cryptographie - Stinson (france) .djvu
Cryptography For Dummies (2004) - Cobb.chm
Cryptography Theory And Practice - Douglas Stinson.chm
Cryptography. A Very Short Intro (2002) - Piper, Murphy.chm
Cryptography.An introduction to computer security.1989 - Sebery J.pdf
Dr.Dobb's essential books on cryptography and security (1997) .rar
Elementary Number Theory (2003) - Clark W Edwin.pdf
Foundations of Cryptography.pdf
Fundamentals of cryptology. A professional reference and interactive tutorial.pdf
Generating a Product of Three Primes with an Unknown Factorization.pdf
Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf
Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu
Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf
Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf
Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots, Izotov, Moldovyan, Moldovya.chm
Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf
Some Applications of coding theory in cryptography (2000) - Doumen, Jeroe


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)