121. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
122. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).
123. Cryptography and secure communication

by Blahut, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
124. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
125. How cybersecurity really works : a hands-on guide for total beginners

by Grubb, Sam.

Publisher: San Francisco : No Starch Press, 2021Availability: Items available for loan: [Call number: 005.8 GRU] (1).
126. Quantum computing and Blockchain in business : exploring the applications, challenges, and collision of quantum computing and blockchain

by Krishnakumar, Arunkumar.

Publisher: Mumbai : Packt Publishing, 2020Availability: Items available for loan: [Call number: 658.514 KRI] (1).
127. Introducing ethereum and solidity : foundations of cryptocurrency and blockchain programming for beginners

by Dannen, Chris.

Publisher: California : Apress, 2017Availability: Items available for loan: [Call number: 005.741 DAN] (1).
128. Quantum cryptography : from key distribution to conference key agreement

by Grasselli, Federico.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
129. Crypto wars : the fight for privacy in the digital age : a political history of digital encryption

by Jarvis, Craig.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
130. Cryptology for engineers : an application-oriented mathematical introduction

by Schmied, Robert.

Publisher: New Jersey : World Scientific, 2020Availability: Items available for loan: [Call number: 005.824 SCH] (1).
131. Privacy is hard and seven other myths : achieving privacy through careful design

by Hoepman, Jaap-Henk.

Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
132. Statistical trend analysis of physically unclonable functions : an approach via text mining

by Zolfaghari, Behrouz | Bibak, Khodakhast | Koshiba, Takeshi | Nemati, Hamid R | Mitra, Pinaki.

Publisher: Boca Raton : CRC Press, 2021Availability: Items available for loan: [Call number: 005.82 ZOL] (1).
133. Combinatorics and number theory of counting sequences

by Istvan, Mezo.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 511.6 IST] (1).
134. Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us

by Spafford, Eugene H | Metcalf, Leigh | Dykstra, Josiah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston : Addison Wesley, 2023Availability: Items available for loan: [Call number: 005.8 SPA] (1).
135. Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10

by Nita, Stefania Loredana | Mihailescu, Marius Iulian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
136. Practical mathematical cryptography

by Gjosteen, Kristian.

Publisher: Boca Raton : CRC Press, 2023Availability: Items available for loan: [Call number: 652.8 GJO] (1).
137. Quantum key distribution : an introduction with exercises

by Wolf, Ramona.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 530.12 WOL] (1).
138. Trusted cellular IoT devices : design ingredients and concepts

by Heins, Kersten.

Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
139. Guide to pairing-based cryptography

by El Mrabet, Nadia [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Availability: Items available for loan: [Call number: 005.82 EIM] (1).
140. Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications

by Schwenk, Jörg.

Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 929 SCH] (1).

Powered by Koha