Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryp...Lees meer
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryp...Lees meer
This text presents the main techniques of algorithm design, namely, divide-and-conquer algorithms, greedy algorithms, dynamic programming algorithms, ...Lees meer
Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical ...Lees meer
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdate...Lees meer
Eschewing the often standard dry and static writing style of traditional textbooks, Discrete Encounters provides a refreshing approach to discrete mat...Lees meer
Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment ...Lees meer
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life...Lees meer
Through three editions, Cryptography: Theory and Practice , has been embraced by instructors and students. It offers a comprehensive primer for the su...Lees meer
This unique, award winning book offers a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathem...Lees meer
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security pr...Lees meer
Through three editions, Cryptography: Theory and Practice , has been embraced by instructors and students alike. It offers a comprehensive primer for ...Lees meer
This useful handbook elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework o...Lees meer
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on bo...Lees meer
Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver...Lees meer
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a scien...Lees meer
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editi...Lees meer