|
121.
|
Security of block ciphers : from algorithm design to hardware implementation
by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
|
|
122.
|
Introduction to modern cryptography
by Katz, Jonathan | Lindell, Yehuda. Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).
|
|
123.
|
Cryptography and secure communication
by Blahut, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
124.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
125.
|
How cybersecurity really works : a hands-on guide for total beginners
by Grubb, Sam. Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
|
|
126.
|
Quantum computing and Blockchain in business : exploring the applications, challenges, and collision of quantum computing and blockchain
by Krishnakumar, Arunkumar. Publisher: Mumbai : Packt Publishing, 2020Availability: Items available for loan: [Call number: 658.514 KRI] (1).
|
|
127.
|
Introducing ethereum and solidity : foundations of cryptocurrency and blockchain programming for beginners
by Dannen, Chris. Publisher: California : Apress, 2017Availability: Items available for loan: [Call number: 005.741 DAN] (1).
|
|
128.
|
Quantum cryptography : from key distribution to conference key agreement
by Grasselli, Federico. Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
|
|
129.
|
Crypto wars : the fight for privacy in the digital age : a political history of digital encryption
by Jarvis, Craig. Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
|
|
130.
|
Cryptology for engineers : an application-oriented mathematical introduction
by Schmied, Robert. Publisher: New Jersey : World Scientific, 2020Availability: Items available for loan: [Call number: 005.824 SCH] (1).
|
|
131.
|
Privacy is hard and seven other myths : achieving privacy through careful design
by Hoepman, Jaap-Henk. Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
|
|
132.
|
Statistical trend analysis of physically unclonable functions : an approach via text mining
by Zolfaghari, Behrouz | Bibak, Khodakhast | Koshiba, Takeshi | Nemati, Hamid R | Mitra, Pinaki. Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.82 ZOL] (1).
|
|
133.
|
Combinatorics and number theory of counting sequences
by Istvan, Mezo. Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 511.6 IST] (1).
|
|
134.
|
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us
by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
|
|
135.
|
Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10
by Nita, Stefania Loredana | Mihailescu, Marius Iulian. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
|
|
136.
|
Practical mathematical cryptography
by Gjosteen, Kristian. Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).
|
|
137.
|
Quantum key distribution : an introduction with exercises
by Wolf, Ramona. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 530.12 WOL] (1).
|
|
138.
|
Trusted cellular IoT devices : design ingredients and concepts
by Heins, Kersten. Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
|
|
139.
|
Guide to pairing-based cryptography
by El Mrabet, Nadia [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton : CRC Press, 2017Availability: Items available for loan: [Call number: 005.82 EIM] (1).
|
|
140.
|
Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications
by Schwenk, Jörg. Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 929 SCH] (1).
|