Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:" Ciphertext"'
Refine your search
Availability
Limit to records with available items
Authors
Adir, Allon
Aharoni, Ehud
Ahmad, Khairol Amali Bin
Breier, Jakub
Chen, Kai
Drucker, Nir
Flores-Flores, Juan Pablo
Harris, Fred
Hou, Xiaolu
Levy, Ronen
Martinez-Guerra, Rafael
Merli, Dominik
Monson, Christopher K.
Montesinos-Garcia, Juan Javier
Nielson, Seth James
Pointcheval, David
Rubinstein-Salzedo, Simon
Schwenk, Jörg
Shaul, Hayim
Sklar, Bernard
Show more
Show less
Item types
Books
Series
EAI/Springer Innovations in Communication and Computing
Information security and cryptography
Sciences. Computer science. Cryptography, data security
Springer undergraduate mathematics series
Synthesis Lectures on Engineering, Science, and Technology
Topics
Bit integer
Bonah-Franklin scheme
BPSK
Channel coding
Ciphertext
Ciphertext
Ciphertext policy-ABE (CP-ABE)
Data encryption
Diffie-Hellman key exchange
Dirty-paper ending (BPC)
Discrete logrithm (DL) problem
Encoder
Encryption
Fractional -order chaotic system
Galactic plane
HMAC
Homomorphic encryption
IFP,DLP
Instability theorem
Kerckhoff's principle
Show more
Show less
Your search returned 11 results.
Not what you expected? Check for
suggestions
Sort
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
1.
Image from Google Jackets
Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications
by
Schwenk, Jörg
Series:
Information security and cryptography
Publication details:
Cham :
Springer,
2022
Availability:
Items available for loan:
DAU
(1)
Call number:
929 SCH
.
Place hold
Save to lists
2.
Image from Google Jackets
Asymmetric cryptography : primitives and protocols
by
Pointcheval, David
[ed.]
Series:
Sciences. Computer science. Cryptography, data security
Publication details:
London :
ISTE Ltd,
2022
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 POI
.
Place hold
Save to lists
3.
Image from Google Jackets
Cryptography and embedded systems security
by
Hou, Xiaolu
Breier, Jakub
Publication details:
Cham :
Springer,
2024
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 HOU
.
Place hold
Save to lists
4.
Image from Google Jackets
Homomorphic encryption for data science (HE4DS)
by
Adir, Allon
Aharoni, Ehud
Drucker, Nir
Levy, Ronen
Shaul, Hayim
Soceanu, Omri
Publication details:
Cham :
springer,
2024
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 ADI
.
Place hold
Save to lists
5.
Image from Google Jackets
Practical cryptography in Python : learning correct cryptography by example
by
Nielson, Seth James
Monson, Christopher K
Publication details:
California :
Apress,
2019
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 NIE
.
Place hold
Save to lists
6.
Image from Google Jackets
Engineering secure devices : a practical guide for embedded system architects and developers
by
Merli, Dominik
Publication details:
San Francisco :
No Starch Press,
2024
Availability:
Items available for loan:
DAU
(1)
Call number:
621.392 MER
.
Place hold
Save to lists
7.
Image from Google Jackets
Digital communications : fundamentals and applications
by
Sklar, Bernard
Harris, Fred
Edition:
3rd ed.
Publication details:
London :
Pearson,
2020
Availability:
Items available for loan:
DAU
(1)
Call number:
621.382 SKL
.
Place hold
Save to lists
8.
Image from Google Jackets
Encryption and decryption algorithms for plain text and images using fractional calculus
by
Martinez-Guerra, Rafael
Montesinos-Garcia, Juan Javier
Flores-Flores, Juan Pablo
Series:
Synthesis Lectures on Engineering, Science, and Technology
; 2690-0327
Publication details:
Cham :
Springer,
2023
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 MAR
.
Place hold
Save to lists
9.
Image from Google Jackets
Cryptography
by
Rubinstein-Salzedo, Simon
Series:
Springer undergraduate mathematics series
Publication details:
Cham :
Springer,
2018
Availability:
Items available for loan:
DAU
(1)
Call number:
652.8 RUB
.
Place hold
Save to lists
10.
Image from Google Jackets
Privacy-preserving computing for big data analytics and AI
by
Chen, Kai
Yang, Qiang
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cambridge :
Cambridge University Press,
2022
Availability:
Items available for loan:
DAU
(1)
Call number:
005.8 CHE
.
Place hold
Save to lists
11.
Image from Google Jackets
Functional encryption
by
Ahmad, Khairol Amali Bin
Ahmad, Khaleel
Dulhare, Uma N
Series:
EAI/Springer Innovations in Communication and Computing
; 2522-8595
Publication details:
Cham :
Springer,
2021
Availability:
Items available for loan:
DAU
(1)
Call number:
621.382 AHM
.
Place hold
Save to lists
Not finding what you're looking for?
Make a
purchase suggestion