QA268 .D5 1996
|
Chinese remainder theorem : applications in computing, coding, cryptography / |
1 |
QA268 .D54 1995
|
Different aspects of coding theory : American Mathematical Society short course, January 2-3, 1995, San Francisco, California / |
2 |
QA268 .D55 1999
|
Codes and association schemes : DIMACS Workshop Codes and Association Schemes, November 9-12, 1999, DIMACS Center / |
1 |
QA268 .D56 1996
|
Chinese remainder theorem : applications in computing, coding, cryptography / |
1 |
QA268 .D664 2014eb
|
Domesticating symbols : metalithikum II / |
1 |
QA268 .E77 2017
|
Error-correction coding and decoding : bounds, codes, decoders, analysis and applications / |
2 |
QA268 .E87 1990
|
Essentials of error-control coding techniques / |
1 |
QA268 .E87 1990eb
|
Essentials of error-control coding techniques / |
1 |
QA268 .E95 1990
|
Eurocode '90 : international symposium on coding theory and applications, Udine, Italy, November 5-9, 1990 : proceedings / |
2 |
QA268 .E95 1992eb
|
Eurocode '92 : International Symposium on Coding Theory and Applications / |
1 |
QA268 .F494 2017
|
Optimisation de la commande robuste par les métaheuristiques |
1 |
QA268 .F6
|
Concatenated codes / |
1 |
QA268 .F85 2006
|
Code design for dependable systems : theory and practical applications / |
2 |
QA268 .G35 2012
|
Mathematics of public key cryptography / |
3 |
QA268 .G574 1991
|
Communication theory / |
1 |
QA268 .G5745 2001
|
Foundations of cryptography : basic tools / |
1 |
QA268 .G5745 2004
|
Foundations of Cryptography. |
1 |
QA268 .G575 1994
|
Basic concepts in information theory and coding : the adventures of secret agent 00111 / |
1 |
QA268 .G576 1988
|
Geometry and codes / |
1 |
QA268 .G576 1988eb
|
Geometry and codes / |
1 |