- This book is no longer available to purchase from Cambridge Core
- Cited by 6
-
Cited byCrossref Citations
This Book has been cited by the following publications. This list is generated based on data provided by Crossref.
Yan, Song Y. 2019. Cybercryptography: Applicable Cryptography for Cyberspace Security. p. 21.
Simoson, Andrew J. 2019. The morphology of . The Mathematical Gazette, Vol. 103, Issue. 558, p. 442.
D’Alessandro, William 2021. Proving quadratic reciprocity: explanation, disagreement, transparency and depth. Synthese, Vol. 198, Issue. 9, p. 8621.
Masri, Ikhwanul Hakim and Susanti, Bety Hayat 2023. Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem. p. 159.
Kelsey, P. W. 2023. A Pulse-on-Pulse Technique for Electronic Warfare Systems. IEEE Transactions on Aerospace and Electronic Systems, Vol. 59, Issue. 6, p. 9769.
Zhou, Guoqing and Xu, Maozhi 2023. Information and Communications Security. Vol. 14252, Issue. , p. 91.
- Publisher:
- Mathematical Association of America
- Online publication date:
- January 2012
- Print publication year:
- 2009
- Online ISBN:
- 9780883859186
- Subjects:
- Mathematics, Number Theory