ADABIYOTLAR RO’YXATI
1.T. Alpcan, T. Basar: Network Security - A Decision and Game-Theoretic Approach
2.Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography
R. Churchhouse: Codes and Ciphers
3.Csiszar, J. Koerner: Information Theory: Coding Theorems for Discrete Memoryless Systems
4.E. Desurvire: Classical and Quantum Information Theory
5.O. Goldreich: Foundations of Cryptography, Volumes I and II
6.S. W. Golomb, G. Gong: Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar
7.M. Hendry: Multi-application Smart Cards Technology and Applications
8.R. Lidl, H. Niederreiter: Finite Fields (2nd Edition)
9.S. Loepp, W. Wootters: Protecting Information: From Classical Error Correction to Quantum Cryptography
10J. H. Loxton: Number Theory and Cryptography
11.M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information
12.M. Obaidat, N. Boudriga: Security of e-Systems and Computer Networks
13.J. Talbot, D. Welsh: Complexity and Cryptography: An Introduction
14.M. Hendry: Multi-application Smart Cards Technology and Applications
15.R. Lidl, H. Niederreiter: Finite Fields (2nd Edition)
16.S. Loepp, W. Wootters: Protecting Information: From Classical Error Correction to Quantum Cryptography
17.J. H. Loxton: Number Theory and Cryptography
FOYDALANILGAN SAYTLAR
1. https://club.dns-shop.ru
2. https://uzbekdevs.uz.
3. https://www.sitepoint.com
4. https://Gidhub.com
5. https://wikipedia.org
6. https://fayllar.org
7. https://hozir.org
8.https//android.com
9. https://kbp.wikipedia.org/wiki/security
10. https://.java.com/ru/
11. https//w3school.com
12https//crypto.com
13 https//.studfayl.net
14.https//neonkaraoke.ru
15.https//codenet.ru
Do'stlaringiz bilan baham: |