Home Advanced Search

Advanced Search - Page 1

Number-Theoretic Methods in Cryptology
  • PDF
  • English
  • Year: 2018
  • Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała
Design of Hashing Algorithms
  • PDF
  • English
  • Year: 1993
  • Author: Josef Pieprzyk, Babak Sadeghiyan (eds.)
Design of Hashing Algorithms
  • DJVU
  • English
  • Year: 1993
  • Author: Josef Pieprzyk, Babak Sadeghiyan (eds.)
Fundamentals of Computer Security
  • PDF
  • English
  • Year: 2003
  • Author: Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
Fundamentals of Computer Security
  • DJVU
  • English
  • Year: 2003
  • Author: Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
Continuous and Discontinuous Modelling of Fracture in Concrete Using FEM
  • PDF
  • English
  • Year: 2013
  • Author: Jacek Tejchman, Jerzy Bobiński (auth.)
Information Security and Privacy: First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings
  • PDF
  • English
  • Year: 1996
  • Author: Steve Orlowski (auth.), Josef Pieprzyk, Jennifer Seberry (eds.)