From professional translators, enterprises, web pages and freely available translation repositories.
"applied cryptography", john wiley & sons, 1994.
"applied cryptography", john wiley & sons, 1994.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
* horst feistel, "cryptography and computer privacy.
*horst feistel, "cryptography and computer privacy.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
selected areas in cryptography", 2001, pp199-211.
" selected areas in cryptography, 2001, pp199–211.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
"applied cryptography", second edition, john wiley & sons, 1996.
"applied cryptography", second edition, john wiley & sons, 1996.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
el complemento de & cryptography; le permite enviar y recibir mensajes cifrados y/ o firmados.
the & cryptography; plugin allows you to send and recieve encrypted and/ or signed messages.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
el java cryptography architecture (jca) es un framework para trabajar con criptografía usando el lenguaje de programación java.
the java cryptography architecture (jca) is a framework for working with cryptography using the java programming language.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
un diseño mejorado de este algoritmo se llamó fortuna, ferguson y schneier lo describen en su libro "practical cryptography".
an improved design from ferguson and schneier, fortuna, is described in their book, "practical cryptography".
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
* blake, seroussi, smart, "elliptic curves in cryptography", cambridge university press, 1999.
* i. blake, g. seroussi, and n. smart, "elliptic curves in cryptography", london mathematical society 265, cambridge university press, 1999.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
la ocde adoptó las “guidelines for cryptography policy” (directrices para la política de criptografía) en marzo de 1997.
the oecd adopted “guidelines for cryptography policy” in march 1997.
Last Update: 2016-11-29
Usage Frequency: 1
Quality:
fue desarrollado por cryptography research inc. y está basado en el concepto self-protecting digital content (spdc) desarrollado por la misma empresa.
it was developed by cryptography research inc. and is based on their self-protecting digital content concept.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
* rfc 4492: “elliptic curve cryptography (ecc) cipher suites for transport layer security (tls)”.
* rfc 4492: "elliptic curve cryptography (ecc) cipher suites for transport layer security (tls)".
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
* hüseyin demirci, erkan türe, ali aydin selçuk, a new meet in the middle attack on the idea block cipher, 10th annual workshop on selected areas in cryptography, 2003.
== literature ==* hüseyin demirci, erkan türe, ali aydin selçuk, a new meet in the middle attack on the idea block cipher, 10th annual workshop on selected areas in cryptography, 2004.
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
== publicaciones ==salomaa es autor y coautor de 46 libros de texto, incluyendo "automata theory" (1969), "formal languages" (1973), "the mathematical theory of l-systems" (1980, con grzegorz rozenberg), "jewels of formal language theory" (1981), "public-key cryptography" (1990) y "dna computing" (1998, con grzegorz rozenberg y gheorge paun).
==publications==salomaa has authored or co-authored 46 textbooks, including "theory of automata" (1969), "formal languages" (1973), "the mathematical theory of l-systems" (1980, with grzegorz rozenberg), "jewels of formal language theory" (1981) "public-key cryptography" (1990) and "dna computing" (1998, with grzegorz rozenberg and gheorghe paun).
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting