- This book is no longer available to purchase from Cambridge Core
- Cited by 6
-
Cited byCrossref Citations
This Book has been cited by the following publications. This list is generated based on data provided by Crossref.
Simoson, Andrew J. 2019. The morphology of . The Mathematical Gazette, Vol. 103, Issue. 558, p. 442.
Yan, Song Y. 2019. Cybercryptography: Applicable Cryptography for Cyberspace Security. p. 21.
D’Alessandro, William 2021. Proving quadratic reciprocity: explanation, disagreement, transparency and depth. Synthese, Vol. 198, Issue. 9, p. 8621.
Zhou, Guoqing and Xu, Maozhi 2023. Information and Communications Security. Vol. 14252, Issue. , p. 91.
Masri, Ikhwanul Hakim and Susanti, Bety Hayat 2023. Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem. p. 159.
Kelsey, P. W. 2023. A Pulse-on-Pulse Technique for Electronic Warfare Systems. IEEE Transactions on Aerospace and Electronic Systems, Vol. 59, Issue. 6, p. 9769.
- Publisher:
- Mathematical Association of America
- Online publication date:
- January 2012
- Print publication year:
- 2009
- Online ISBN:
- 9780883859186
- Subjects:
- Mathematics, Number Theory