The following text field will produce suggestions that follow it as you type.

Barnes and Noble

Lattice-Based Cryptosystems: A Design Perspective

Unfortunately, this item is no longer available, but we found some similar items you might like.
Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware

Barnes and Noble
Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography

Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography

Barnes and Noble
Lattice Concepts of Module Theory / Edition 1

Lattice Concepts of Module Theory / Edition 1

Barnes and Noble
Design and Analysis of Cryptographic Algorithms Blockchain

Design and Analysis of Cryptographic Algorithms Blockchain

Barnes and Noble
Lattice Points / Edition 1

Lattice Points / Edition 1

Barnes and Noble
Principles of the Theory of Lattice Dynamics

Principles of the Theory of Lattice Dynamics

Barnes and Noble
Symmetric Cryptography, Volume 1: Design and Security Proofs

Symmetric Cryptography, Volume 1: Design and Security Proofs

Barnes and Noble
Lecture Notes On Algebraic Structure Of Lattice-ordered Rings

Lecture Notes On Algebraic Structure Of Lattice-ordered Rings

Barnes and Noble
Lattice-Reduction-Aided and Integer-Forcing Equalization: Structures, Criteria, Factorization, and Coding

Lattice-Reduction-Aided and Integer-Forcing Equalization: Structures, Criteria, Factorization, and Coding

Barnes and Noble
Lattice Dynamics of Molecular Crystals

Lattice Dynamics of Molecular Crystals

Barnes and Noble
Group-based Cryptography

Group-based Cryptography

Barnes and Noble
Symmetric Designs: An Algebraic Approach

Symmetric Designs: An Algebraic Approach

Barnes and Noble
Cryptography : Protocols, Design and Applications

Cryptography : Protocols, Design and Applications

Barnes and Noble
Cryptography: Theory and Practice

Cryptography: Theory and Practice

Barnes and Noble
Introduction to Cryptography with Mathematical Foundations and Computer Implementations

Introduction to Cryptography with Mathematical Foundations and Computer Implementations

Barnes and Noble
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

Barnes and Noble
Powered by Adeptmind