Arama Sonu&ccedil;ları Cryptography. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026ps$003d300?dt=list 2025-09-07T04:42:42Z Cryptography. ent://SD_ILS/0/SD_ILS:2342056 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Buchanan, William.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=30251706">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography ent://SD_ILS/0/SD_ILS:2236825 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Anderson, Rane, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5881542">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography ent://SD_ILS/0/SD_ILS:2144450 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Buchanan, William J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5050193">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Contemporary Cryptography. ent://SD_ILS/0/SD_ILS:1183647 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231638">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Java cryptography ent://SD_ILS/0/SD_ILS:2280601 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Knudsen, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/1565924029">https://learning.oreilly.com/library/view/~/1565924029</a> <a href="https://go.oreilly.com/library-access/library/view/-/1565924029/?ar">https://go.oreilly.com/library-access/library/view/-/1565924029/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1565924029/?ar">https://learning.oreilly.com/library/view/~/1565924029/?ar</a><br/>Format:&#160;Electronic Resources<br/> Contemporary Cryptography. ent://SD_ILS/0/SD_ILS:1264069 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1531534">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography Made Simple ent://SD_ILS/0/SD_ILS:2084549 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Smart, Nigel P. author.<br/><a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2330383 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332808 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a> <a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format:&#160;Sound recording<br/> Group theoretic cryptography ent://SD_ILS/0/SD_ILS:2306763 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Gonz&aacute;lez Vasco, Maria Isabel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar">https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781584888369/?ar">https://learning.oreilly.com/library/view/~/9781584888369/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781584888369">https://learning.oreilly.com/library/view/~/9781584888369</a><br/>Format:&#160;Electronic Resources<br/> Group theoretic cryptography ent://SD_ILS/0/SD_ILS:2270502 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Gonz&aacute;lez Vasco, Mar&iacute;a Isabel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1619960">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography cracking codes ent://SD_ILS/0/SD_ILS:1385997 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Curley, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1220658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:2355428 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Padhye, Sahadeo, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5508462">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:64189 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;St. Denis, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Cryptography for Developers. ent://SD_ILS/0/SD_ILS:1195845 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;St Denis, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319199">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:2283638 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;St. Denis, Tom.<br/><a href="https://www.sciencedirect.com/science/book/9781597491044">https://www.sciencedirect.com/science/book/9781597491044</a> <a href="https://learning.oreilly.com/library/view/~/1597491047">https://learning.oreilly.com/library/view/~/1597491047</a> <a href="https://go.oreilly.com/library-access/library/view/-/1597491047/?ar">https://go.oreilly.com/library-access/library/view/-/1597491047/?ar</a> <a href="https://learning.oreilly.com/library/view/~/1597491047/?ar">https://learning.oreilly.com/library/view/~/1597491047/?ar</a><br/>Format:&#160;Electronic Resources<br/> Real-world cryptography ent://SD_ILS/0/SD_ILS:2332150 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a> <a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format:&#160;Video recording<br/> Group-based Cryptography ent://SD_ILS/0/SD_ILS:503939 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Myasnikov, Alexei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format:&#160;Electronic Resources<br/> Cryptography: theory practice ent://SD_ILS/0/SD_ILS:11136 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Stinson,Douglas R. (Douglas Robert), 1956-<br/>Format:&#160;Books<br/> . Net Security and Cryptography. ent://SD_ILS/0/SD_ILS:2317896 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Thorsteinson, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/013100851X">https://learning.oreilly.com/library/view/~/013100851X</a> <a href="https://learning.oreilly.com/library/view/~/013100851X/?ar">https://learning.oreilly.com/library/view/~/013100851X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/013100851X/?ar">https://go.oreilly.com/library-access/library/view/-/013100851X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography : Infosec pro guide ent://SD_ILS/0/SD_ILS:2301165 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Oriyano, Sean-Philip.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071794251/?ar">https://go.oreilly.com/library-access/library/view/-/9780071794251/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071794251/?ar">https://learning.oreilly.com/library/view/~/9780071794251/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071794251">https://learning.oreilly.com/library/view/~/9780071794251</a><br/>Format:&#160;Electronic Resources<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:2325148 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bray, Shannon, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781119612209">https://learning.oreilly.com/library/view/~/9781119612209</a> <a href="https://learning.oreilly.com/library/view/~/9781119612209/?ar">https://learning.oreilly.com/library/view/~/9781119612209/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119612209/?ar">https://go.oreilly.com/library-access/library/view/-/9781119612209/?ar</a><br/>Format:&#160;Electronic Resources<br/> Quantum Cryptography and Computing. ent://SD_ILS/0/SD_ILS:1290573 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kilin, S.Ya.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3014999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2314416 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format:&#160;Electronic Resources<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:2283057 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:2310281 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a> <a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing cryptography using python ent://SD_ILS/0/SD_ILS:2274652 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bray, Shannon, 1972- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6265337">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography : theory and practice ent://SD_ILS/0/SD_ILS:2280415 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Stinson, Douglas R. (Douglas Robert), 1956- author<br/>Format:&#160;Books<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:2295951 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography : Protocols, Design, and Applications. ent://SD_ILS/0/SD_ILS:1293910 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Lek, Kamol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3021394">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:2282126 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format:&#160;Electronic Resources<br/> Guide to pairing-based cryptography ent://SD_ILS/0/SD_ILS:2108937 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5475691">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Quantum Cryptography : Potentially Perfect Security. ent://SD_ILS/0/SD_ILS:1326721 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411424">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An Introduction to Mathematical Cryptography. ent://SD_ILS/0/SD_ILS:1202354 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hoffstein, Jeffrey.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=416993">Click to View</a><br/>Format:&#160;Electronic Resources<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:2129990 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1165936">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Information theory : coding and cryptography ent://SD_ILS/0/SD_ILS:2304164 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Saha, A. (Arjit)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9788131797495/?ar">https://go.oreilly.com/library-access/library/view/-/9788131797495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131797495/?ar">https://learning.oreilly.com/library/view/~/9788131797495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9788131797495">https://learning.oreilly.com/library/view/~/9788131797495</a><br/>Format:&#160;Electronic Resources<br/> The manga guide to cryptography ent://SD_ILS/0/SD_ILS:2232376 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mitani, Masaaki, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5790493">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Java ent://SD_ILS/0/SD_ILS:2319124 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern Cryptography for Cybersecurity Professionals ent://SD_ILS/0/SD_ILS:2329113 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bock, Lisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838644352/?ar">https://go.oreilly.com/library-access/library/view/-/9781838644352/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838644352/?ar">https://learning.oreilly.com/library/view/~/9781838644352/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781838644352">https://learning.oreilly.com/library/view/~/9781838644352</a><br/>Format:&#160;Electronic Resources<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:507726 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Welschenbach, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format:&#160;Electronic Resources<br/> Guide to elliptic curve cryptography ent://SD_ILS/0/SD_ILS:2335766 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hankerson, Darrel R., author<br/>Format:&#160;Books<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:501938 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Silverman, J.H. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:504178 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:511946 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Coding Theory and Cryptography. ent://SD_ILS/0/SD_ILS:1258348 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Shaska, Tanush.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193247">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:2292511 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cimato, Stelvio.<br/><a href="https://learning.oreilly.com/library/view/~/9781439837221/?ar">https://learning.oreilly.com/library/view/~/9781439837221/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439837221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439837221/?ar</a><br/>Format:&#160;Electronic Resources<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:2131432 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1449352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Understanding bitcoin : cryptography, engineering and economics ent://SD_ILS/0/SD_ILS:2304819 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Franco, Pedro.<br/><a href="https://learning.oreilly.com/library/view/~/9781119019145">https://learning.oreilly.com/library/view/~/9781119019145</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119019145/?ar">https://go.oreilly.com/library-access/library/view/-/9781119019145/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119019145/?ar">https://learning.oreilly.com/library/view/~/9781119019145/?ar</a><br/>Format:&#160;Electronic Resources<br/> SSCP video course. Domain 5, Cryptography ent://SD_ILS/0/SD_ILS:2286747 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Harris, Shon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780789741943/?ar">https://go.oreilly.com/library-access/library/view/-/9780789741943/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780789741943/?ar">https://learning.oreilly.com/videos/~/9780789741943/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780789741943">https://learning.oreilly.com/videos/~/9780789741943</a><br/>Format:&#160;Electronic Resources<br/> Understanding Bitcoin : Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:1277749 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:528109 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Martin, Keith M.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/> Public-key cryptography : theory and practice ent://SD_ILS/0/SD_ILS:2290653 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Das, Abhijit, 1968-<br/><a href="https://learning.oreilly.com/library/view/~/9788131708323/?ar">https://learning.oreilly.com/library/view/~/9788131708323/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9788131708323/?ar">https://go.oreilly.com/library-access/library/view/-/9788131708323/?ar</a><br/>Format:&#160;Electronic Resources<br/> The mathematics of public key cryptography ent://SD_ILS/0/SD_ILS:2091110 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Galbraith, Steven D.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=866868">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:65679 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">An electronic book accessible through the World Wide Web; click for information</a> Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001099790.html">http://www.loc.gov/catdir/description/els031/2001099790.html</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001099790.html">http://www.loc.gov/catdir/toc/els031/2001099790.html</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding, steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2287580 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format:&#160;Electronic Resources<br/> Disappearing cryptography : information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:2280752 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9781558607699/?ar">https://learning.oreilly.com/library/view/~/9781558607699/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar">https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar</a><br/>Format:&#160;Electronic Resources<br/> Elliptic curves : number theory and cryptography ent://SD_ILS/0/SD_ILS:2284895 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Washington, Lawrence C.<br/><a href="https://learning.oreilly.com/library/view/~/9781420071474">https://learning.oreilly.com/library/view/~/9781420071474</a> <a href="https://learning.oreilly.com/library/view/~/9781420071474/?ar">https://learning.oreilly.com/library/view/~/9781420071474/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420071474/?ar">https://go.oreilly.com/library-access/library/view/-/9781420071474/?ar</a><br/>Format:&#160;Electronic Resources<br/> Number Story : From Counting to Cryptography. ent://SD_ILS/0/SD_ILS:1197438 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Higgins, Peter Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=336634">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Basics Of Contemporary Cryptography For It Practitioners. ent://SD_ILS/0/SD_ILS:1192502 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ryabko , Boris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=296069">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Java cryptography extensions practical guide for programmers ent://SD_ILS/0/SD_ILS:65657 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Weiss, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">An electronic book accessible through the World Wide Web; click for information</a> Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003070900.html">http://www.loc.gov/catdir/toc/els051/2003070900.html</a> Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003070900.html">http://www.loc.gov/catdir/description/els041/2003070900.html</a><br/>Format:&#160;Electronic Resources<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:2304818 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Azad, Saiful.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482228892/?ar">https://go.oreilly.com/library-access/library/view/-/9781482228892/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781482228892/?ar">https://learning.oreilly.com/library/view/~/9781482228892/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cryptography with Open-Source Software. ent://SD_ILS/0/SD_ILS:2307016 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and network security: principles and practice ent://SD_ILS/0/SD_ILS:11868 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Stallings, William.<br/>Format:&#160;Books<br/> Cryptography and security services mechanisms and applications ent://SD_ILS/0/SD_ILS:2261265 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mogollon, Manuel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-837-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-837-6</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSL / TLS Using Cryptography and PKI. ent://SD_ILS/0/SD_ILS:1228919 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Davies, Joshua.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706899">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A course in number theory and cryptography. ent://SD_ILS/0/SD_ILS:904 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Koblitz, Neal, 1948-<br/>Format:&#160;Books<br/> Handbook of elliptic and hyperelliptic curve cryptography ent://SD_ILS/0/SD_ILS:47398 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cohen, Henri, editor.<br/>Format:&#160;Books<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:2131708 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1633743">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:2308177 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Tokareva, Natalia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128025550">https://learning.oreilly.com/library/view/~/9780128025550</a> <a href="https://learning.oreilly.com/library/view/~/9780128025550/?ar">https://learning.oreilly.com/library/view/~/9780128025550/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128025550/?ar">https://go.oreilly.com/library-access/library/view/-/9780128025550/?ar</a><br/>Format:&#160;Electronic Resources<br/> Bent functions : results and applications to cryptography ent://SD_ILS/0/SD_ILS:2098152 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography Learn Public Key Infrastructure from Scratch ent://SD_ILS/0/SD_ILS:2327091 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Rana, Himanshu VerfasserIn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800565463/?ar">https://go.oreilly.com/library-access/library/view/-/9781800565463/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800565463/?ar">https://learning.oreilly.com/videos/~/9781800565463/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781800565463">https://learning.oreilly.com/videos/~/9781800565463</a><br/>Format:&#160;Electronic Resources<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:507229 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:504837 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Baig&egrave;neres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/> A course in number theory and cryptography ent://SD_ILS/0/SD_ILS:2225215 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Koblitz, Neal, 1948- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3074527">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:2084570 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:2290966 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptography : Synergy for a Robust Communication. ent://SD_ILS/0/SD_ILS:1261953 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Zivic, Natasa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377173">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Identity-Based Cryptography : Cryptology and Information Security Series. ent://SD_ILS/0/SD_ILS:1205097 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Joye, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=433453">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM eServer zSeries 990 (z990) Cryptography Implementation. ent://SD_ILS/0/SD_ILS:1310182 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306791">Click to View</a><br/>Format:&#160;Electronic Resources<br/> IBM eserver zSeries 990 (z990) cryptography implementation ent://SD_ILS/0/SD_ILS:2283292 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Rayns, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/0738490369">https://learning.oreilly.com/library/view/~/0738490369</a> <a href="https://learning.oreilly.com/library/view/~/0738490369/?ar">https://learning.oreilly.com/library/view/~/0738490369/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738490369/?ar">https://go.oreilly.com/library-access/library/view/-/0738490369/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography for Security and Privacy in Cloud Computing. ent://SD_ILS/0/SD_ILS:1263224 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Rass, Stefan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463547">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography's Role in Securing the Information Society. ent://SD_ILS/0/SD_ILS:1317799 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dam, Kenneth W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375712">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Network security and cryptography : a self-teaching introduction ent://SD_ILS/0/SD_ILS:2214460 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5389089">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:2086907 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;PATRANABIS, SIKHAR. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Electronic Resources<br/> Secret key cryptography : ciphers, from simple to unbreakable ent://SD_ILS/0/SD_ILS:2334094 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format:&#160;Electronic Resources<br/> Discrete algebraic methods : arithmetic, cryptography, automata, and groups ent://SD_ILS/0/SD_ILS:2060239 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Diekert, Volker, 1955- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4533883">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Serious cryptography : a practical introduction to modern encryption ent://SD_ILS/0/SD_ILS:2316208 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:502537 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Biggs, N.L. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/> Transitioning to quantum-safe cryptography on IBM Z ent://SD_ILS/0/SD_ILS:2333933 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format:&#160;Electronic Resources<br/> Security for Wireless Sensor Networks using Identity-Based Cryptography ent://SD_ILS/0/SD_ILS:2327286 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:2288229 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Schneier, Bruce, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar">https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780471117094/?ar">https://learning.oreilly.com/library/view/~/9780471117094/?ar</a><br/>Format:&#160;Electronic Resources<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:2307810 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Schneier, Bruce, 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119096726/?ar">https://go.oreilly.com/library-access/library/view/-/9781119096726/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119096726/?ar">https://learning.oreilly.com/library/view/~/9781119096726/?ar</a><br/>Format:&#160;Electronic Resources<br/> Authentication and access control : practical cryptography methods and tools ent://SD_ILS/0/SD_ILS:2327123 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a> <a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modern cryptography : applied mathematics for encryption and information security ent://SD_ILS/0/SD_ILS:2309514 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259588099/?ar">https://go.oreilly.com/library-access/library/view/-/9781259588099/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781259588099">https://learning.oreilly.com/library/view/~/9781259588099</a> <a href="https://learning.oreilly.com/library/view/~/9781259588099/?ar">https://learning.oreilly.com/library/view/~/9781259588099/?ar</a><br/>Format:&#160;Electronic Resources<br/> A Classical Introduction to Cryptography Applications for Communications Security ent://SD_ILS/0/SD_ILS:504461 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Curves and Finite Fields : Cryptography and Other Applications. ent://SD_ILS/0/SD_ILS:1269941 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Achter, Jeffrey D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1663205">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Practical cryptography in Python : learning correct cryptography by example ent://SD_ILS/0/SD_ILS:2322367 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Nielson, Seth James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249000/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249000/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484249000/?ar">https://learning.oreilly.com/library/view/~/9781484249000/?ar</a><br/>Format:&#160;Electronic Resources<br/> CompTIA security+ SY0-201 video course. Domain 5, Cryptography ent://SD_ILS/0/SD_ILS:2287284 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Harris, Shon.<br/><a href="https://learning.oreilly.com/videos/~/9780789740069">https://learning.oreilly.com/videos/~/9780789740069</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780789740069/?ar">https://go.oreilly.com/library-access/library/view/-/9780789740069/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780789740069/?ar">https://learning.oreilly.com/videos/~/9780789740069/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and cryptanalysis in MATLAB : creating and programming advanced algorithms ent://SD_ILS/0/SD_ILS:2330025 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mihailescu, Marius Iulian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273340/?ar">https://learning.oreilly.com/library/view/~/9781484273340/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484273340/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273340/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484273340">https://learning.oreilly.com/library/view/~/9781484273340</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:2087504 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/> History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms ent://SD_ILS/0/SD_ILS:2084060 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dooley, John F. author.<br/><a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format:&#160;Electronic Resources<br/> Encryption for organizations and individuals : basics of contemporary and quantum cryptography ent://SD_ILS/0/SD_ILS:2325463 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a> <a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format:&#160;Electronic Resources<br/> Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme ent://SD_ILS/0/SD_ILS:409009 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Aslanoğlu, Rabia.<br/><a href="http://hdl.handle.net/11147/3614">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> The physics of quantum information : quantum cryptography, quantum teleportation, quantum computation ent://SD_ILS/0/SD_ILS:80052 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bouwmeester, Dirk, 1967-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0815/00030749-d.html">http://www.loc.gov/catdir/enhancements/fy0815/00030749-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0815/00030749-t.html">http://www.loc.gov/catdir/enhancements/fy0815/00030749-t.html</a><br/>Format:&#160;Books<br/> Pro cryptography and cryptanalysis : creating advanced algorithms with C# and .NET ent://SD_ILS/0/SD_ILS:2327519 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mihailescu, Marius Iulian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484263679">https://learning.oreilly.com/library/view/~/9781484263679</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484263679/?ar">https://go.oreilly.com/library-access/library/view/-/9781484263679/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484263679/?ar">https://learning.oreilly.com/library/view/~/9781484263679/?ar</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic problems of group theory, their complexity, and applications to cryptography ent://SD_ILS/0/SD_ILS:2227007 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kahrobaei, Delaram, 1975- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3114280">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting ent://SD_ILS/0/SD_ILS:502865 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cole, Peter H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format:&#160;Electronic Resources<br/> The currency cold war : cash and cryptography, hash rates and hegemony ent://SD_ILS/0/SD_ILS:2278349 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Birch, David G. W., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6194230">Click to View</a><br/>Format:&#160;Electronic Resources<br/> International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019 ent://SD_ILS/0/SD_ILS:2183829 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Takagi, Tsuyoshi<br/><a href="https://library.oapen.org/bitstream/20.500.12657/42930/1/2021_Book_InternationalSymposiumOnMathem.pdf">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/25889">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019 ent://SD_ILS/0/SD_ILS:2182467 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Takagi, Tsuyoshi<br/><a href="https://library.oapen.org/bitstream/20.500.12657/46834/1/2021_Book_InternationalSymposiumOnMathem.pdf">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/63693">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Physics and Theoretical Computer Science : From Numbers and Languages to (quantum) Cryptography. ent://SD_ILS/0/SD_ILS:1193203 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Gazeau, J.-P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=305174">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The code book : the secret history of codes and code-breaking cryptography ent://SD_ILS/0/SD_ILS:2280339 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Singh, Simon, author.<br/>Format:&#160;Books<br/> Pro cryptography and cryptanalysis with C++20 : creating and programming advanced algorithms ent://SD_ILS/0/SD_ILS:2327591 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mihailescu, Marius Iulian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265864">https://learning.oreilly.com/library/view/~/9781484265864</a> <a href="https://learning.oreilly.com/library/view/~/9781484265864/?ar">https://learning.oreilly.com/library/view/~/9781484265864/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484265864/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265864/?ar</a><br/>Format:&#160;Electronic Resources<br/> The code book: the science of secrecy from ancient egypt to quantum cryptography ent://SD_ILS/0/SD_ILS:11420 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Singh, Simon.<br/>Format:&#160;Books<br/> Breaking the Unbreakable : Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography. ent://SD_ILS/0/SD_ILS:2363636 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Jogenfors, Jonathan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5116594">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto ent://SD_ILS/0/SD_ILS:2273795 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5946044">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto ent://SD_ILS/0/SD_ILS:2322192 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119618195/?ar">https://learning.oreilly.com/library/view/~/9781119618195/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119618195">https://learning.oreilly.com/library/view/~/9781119618195</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119618195/?ar">https://go.oreilly.com/library-access/library/view/-/9781119618195/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography : the key to digital security, how it works, and why it matters ent://SD_ILS/0/SD_ILS:2324620 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Martin, Keith M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781684579136/?ar">https://go.oreilly.com/library-access/library/view/-/9781684579136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781684579136/?ar">https://learning.oreilly.com/library/view/~/9781684579136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781684579136">https://learning.oreilly.com/library/view/~/9781684579136</a><br/>Format:&#160;Sound recording<br/> Providing Sound Foundations for Cryptography : On the Work of Shafi Goldwasser and Silvio Micali. ent://SD_ILS/0/SD_ILS:2359151 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Goldreich, Oded.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6954878">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:2086375 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic, geometry, cryptography, and coding theory : international conference, November 5-9, 2007, CIRM, Marseilles, France ent://SD_ILS/0/SD_ILS:2225883 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Lachaud, Gilles, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113150">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on cryptography with Python : leverage the power of Python to encrypt and decrypt data ent://SD_ILS/0/SD_ILS:2317101 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bowne, Sam, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789534443/?ar">https://go.oreilly.com/library-access/library/view/-/9781789534443/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789534443">https://learning.oreilly.com/library/view/~/9781789534443</a> <a href="https://learning.oreilly.com/library/view/~/9781789534443/?ar">https://learning.oreilly.com/library/view/~/9781789534443/?ar</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512680 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513023 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510644 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503633 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/> Cryptography Algorithms : a Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption ent://SD_ILS/0/SD_ILS:2331580 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bertaccini, Massimo.<br/><a href="https://learning.oreilly.com/library/view/~/9781789617139">https://learning.oreilly.com/library/view/~/9781789617139</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789617139/?ar">https://go.oreilly.com/library-access/library/view/-/9781789617139/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789617139/?ar">https://learning.oreilly.com/library/view/~/9781789617139/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cryptography algorithms : a guide to algorithms in blockchain, quantum cryptography, zero-Knowledge protocols, and homomorphic encryption ent://SD_ILS/0/SD_ILS:2376399 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bertaccini, Massimo, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870913">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:503753 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:511288 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ytrehus, &Oslash;yvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/> Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511771 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511199 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Electronic Resources<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:508929 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Schroeder, Manfred R. author.<br/><a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format:&#160;Electronic Resources<br/> Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data ent://SD_ILS/0/SD_ILS:2353723 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bock, Lisa, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6631539">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core ent://SD_ILS/0/SD_ILS:2318697 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Haunts, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243756/?ar">https://learning.oreilly.com/library/view/~/9781484243756/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243756">https://learning.oreilly.com/library/view/~/9781484243756</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085107 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085523 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085290 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085538 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512529 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503660 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503387 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511586 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509753 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085854 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/> Algorithmic arithmetic, geometry, and coding theory : 14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, France ent://SD_ILS/0/SD_ILS:2229127 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;International Conference Arithmetic, Geometry, Cryptography and Coding Theory (14th : 2013 : Marseille, France)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4832013">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Demystifying Cryptography with OpenSSL 3.0 : Discover the Best Techniques to Enhance Your Network Security with OpenSSL 3. 0 ent://SD_ILS/0/SD_ILS:2334832 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Khlebnikov, Alexei.<br/><a href="https://learning.oreilly.com/library/view/~/9781800560345">https://learning.oreilly.com/library/view/~/9781800560345</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781800560345/?ar">https://go.oreilly.com/library-access/library/view/-/9781800560345/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781800560345/?ar">https://learning.oreilly.com/library/view/~/9781800560345/?ar</a><br/>Format:&#160;Electronic Resources<br/> Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser ent://SD_ILS/0/SD_ILS:2374138 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Segala, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870914">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser ent://SD_ILS/0/SD_ILS:2331570 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085802 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086143 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:512793 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085253 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:510749 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:513032 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510020 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:509743 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Handschuh, Helena. editor.<br/><a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 ent://SD_ILS/0/SD_ILS:2332617 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512248 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085390 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/> Recent trends in cryptography : UIMP-RSME Santal&oacute; Summer School, July 11-15, 2005, Universidad Internacional Men&eacute;ndez Pelayo, Santander, Spain ent://SD_ILS/0/SD_ILS:2225890 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;UIMP-RSME Santal&oacute; Summer School (2005 : Universidad Internadional Men&eacute;ndez Pelayo), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113157">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086064 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085801 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085677 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12&ndash;14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085972 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086079 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086095 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503610 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers ent://SD_ILS/0/SD_ILS:510843 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502691 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/> Group theory, statistics, and cryptography : AMS Special Session, Combinatorial and Statistical Group Theory, April 12-13, 2003, New York University ent://SD_ILS/0/SD_ILS:2226014 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;AMS Special Session Combinatorial and Statistical Group Theory (2003 : New York University), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113281">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085778 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy : 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2358695 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Avoine, Gildas, editor.<br/>Format:&#160;Books<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085937 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format:&#160;Electronic Resources<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:503803 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kawano, Yasuhito. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086186 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers ent://SD_ILS/0/SD_ILS:511773 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 &ndash; March 3, 2005. Revised Papers ent://SD_ILS/0/SD_ILS:510132 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic, geometry, cryptography, and coding theory : 15th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory, May 18-22, 2015, CIRM, Marseille, France ent://SD_ILS/0/SD_ILS:2229579 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bassa, Alp, 1982- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4908299">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503372 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography &ndash; PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512381 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic, geometry, cryptography and coding theory : 13th Conference on Arithmetic, Geometry, Cryptography and Coding Theory, March 14-18, 2011, CIRM, Marseille, France : Geocrypt 2011, June 19-24, 2011, Bastia, France ent://SD_ILS/0/SD_ILS:2226018 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;International Conference Arithmetic, Geometry, Cryptography and Coding Theory (13th : 2011 : Marseille, France), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113285">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings ent://SD_ILS/0/SD_ILS:509757 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography and Computational Number Theory : Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000. ent://SD_ILS/0/SD_ILS:1298896 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Alster, Kazimierz.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3042141">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings ent://SD_ILS/0/SD_ILS:511007 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic geometry : computation and applications : 16th International Conference on Arithmetic, Geometry, Cryptography, and Coding Theory, June 19-23, 2017, Centre International de Rencontres Mathematiques, Marseille, France ent://SD_ILS/0/SD_ILS:2231563 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Aubry, Yves, 1965- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5633661">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085983 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085844 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:513033 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format:&#160;Electronic Resources<br/> Algebraic methods in cryptography : Special Session on Algebraic Cryptography at the Joint International Meeting of the AMS and the Deutsche Mathematiker-Vereinigung, June 16-19, 2005, Mainz, Germany : International Workshop on Algebraic Methods in Cryptography, November 17-19, 2005, Bochum, Germany ent://SD_ILS/0/SD_ILS:2226117 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Special Session on Algebraic Cryptography at the Joint International Meeting of the AMS and the Deutsche Mathematiker-Vereinigung (2005 : Mainz, Germany), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113384">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Error-correcting codes, finite geometries, and cryptography : Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session, Error Control Codes, Information Theory and Applied Cryptography, CMS Winter Meeting, Dec 8-10, 2007, London, Ontario, Canada ent://SD_ILS/0/SD_ILS:2226123 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Conference on Error-control Codes, Information Theory, and Applied Cryptography (2007 : Toronto, Ont.), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113390">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Arithmetic, geometry, cryptography, and coding theory 2009 : 12th Conference on Arithmetic, Geometry, Cryptography, and Coding Theory, March 30-April 3, 2009, Marseille, France : Geocrypt Conference, April 27-May 1, 2009, Pointe-&agrave;-Pitre, Guadeloupe, France : European Science Foundation Exploratory Workshop, Curves, Coding Theory, and Cryptography, March 25-29, 2009, Marseille, France ent://SD_ILS/0/SD_ILS:2226082 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;International Conference Arithmetic, Geometry, Cryptography and Coding Theory (12th : 2009 : Marseille, France), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113349">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computational and combinatorial group theory and cryptography : AMS Special Sessions : Computational Algebra, Groups, and Applications, April 30-May 1, 2011, University of Nevada, Las Vegas, Nevada, NV : Mathematical Aspects of Cryptography and Cyber Security, September 10-11, 2011, Cornell University, Ithaca, New York ent://SD_ILS/0/SD_ILS:2226158 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Fine, Benjamin, 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113425">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Algebra and computer science : Joint AMS-EMS-SPM Meeting Algebra and Computer Science June 10-13, 2015: Porto, Portugal : Joint Mathematics Meetings Groups, Algorithms, and Cryptography January 10-13, 2015: San Antonio, TX : Joint AMS-Israel Mathematical Union Meeting Applications of Algebra to Cryptography June 16-19, 2014: Tel-Aviv, Israel ent://SD_ILS/0/SD_ILS:2229515 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kahrobaei, Delaram, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4901796">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Deletion ent://SD_ILS/0/SD_ILS:2084749 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format:&#160;Electronic Resources<br/> Modelling and Verification of Secure Exams ent://SD_ILS/0/SD_ILS:2084681 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Giustolisi, Rosario. author.<br/><a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format:&#160;Electronic Resources<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:512052 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/> Concurrent Zero-Knowledge With Additional Background by Oded Goldreich ent://SD_ILS/0/SD_ILS:510794 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Rosen, Alon. author.<br/><a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format:&#160;Electronic Resources<br/> Access control, security, and trust : a logical approach ent://SD_ILS/0/SD_ILS:2131737 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Chin, Shiu-Kai, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648320">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:2293737 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Pal, Sankar K.<br/><a href="https://learning.oreilly.com/library/view/~/9781439856857">https://learning.oreilly.com/library/view/~/9781439856857</a> <a href="https://learning.oreilly.com/library/view/~/9781439856857/?ar">https://learning.oreilly.com/library/view/~/9781439856857/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439856857/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856857/?ar</a><br/>Format:&#160;Electronic Resources<br/> Handbook on soft computing for video surveillance ent://SD_ILS/0/SD_ILS:2126631 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Pal, Sankar K.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=870695">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Visualization and verbalization of data ent://SD_ILS/0/SD_ILS:2270261 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Blasius, J&ouml;rg, 1957- editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1414098">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Communication system security ent://SD_ILS/0/SD_ILS:2131641 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Chen, Lidong, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1575384">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction. ent://SD_ILS/0/SD_ILS:2337101 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kheyfits, Alexander I.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6741210">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Şifreler kitabı: işaretler, semboller, kodlar, gizli diller ent://SD_ILS/0/SD_ILS:430236 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Lunde, Paul, 1943- editor.<br/>Format:&#160;Books<br/> Şifrelerin matematiği : kriptografi ent://SD_ILS/0/SD_ILS:73860 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;&Ccedil;imen, Canan.<br/>Format:&#160;Books<br/> Kryptografie : verfahren, protokolle, infrastrukturen ent://SD_ILS/0/SD_ILS:2310348 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Schmeh, Klaus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457199783/?ar">https://go.oreilly.com/library-access/library/view/-/9781457199783/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457199783/?ar">https://learning.oreilly.com/library/view/~/9781457199783/?ar</a><br/>Format:&#160;Electronic Resources<br/> Kryptografie : verfahren, protokolle, infrastrukturen ent://SD_ILS/0/SD_ILS:2299500 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Schmeh, Klaus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457182716/?ar">https://go.oreilly.com/library-access/library/view/-/9781457182716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457182716/?ar">https://learning.oreilly.com/library/view/~/9781457182716/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457199783">https://learning.oreilly.com/library/view/~/9781457199783</a><br/>Format:&#160;Electronic Resources<br/> Cracking codes &amp; cryptograms for dummies ent://SD_ILS/0/SD_ILS:2288465 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Sutherland, Denise.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470591000/?ar">https://go.oreilly.com/library-access/library/view/-/9780470591000/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470591000/?ar">https://learning.oreilly.com/library/view/~/9780470591000/?ar</a><br/>Format:&#160;Electronic Resources<br/> Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library ent://SD_ILS/0/SD_ILS:63418 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Uslu, Sevgi.<br/><a href="http://hdl.handle.net/11147/3836">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> A distributed multiprecision cryptographic library design ent://SD_ILS/0/SD_ILS:16565 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hışıl, H&uuml;seyin.<br/><a href="http://hdl.handle.net/11147/3226">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystems ent://SD_ILS/0/SD_ILS:63360 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mersin, Ali.<br/><a href="http://hdl.handle.net/11147/3830">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Issues in Online Security : Issues in Online Security. ent://SD_ILS/0/SD_ILS:1196590 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Gorman, Gary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328763">Click to View</a><br/>Format:&#160;Electronic Resources<br/> A genetic algorithmic approach to the differential and linear cryptanalysis ent://SD_ILS/0/SD_ILS:87568 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Eminağaoğlu, Mete.<br/><a href="http://hdl.handle.net/11147/3968">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2173070 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dirk Beyer<br/><a href="https://link.springer.com/book/10.1007/978-3-319-89960-2">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/60989">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Codes and Ciphers : Julius Caesar, the Enigma, and the Internet. ent://SD_ILS/0/SD_ILS:1181573 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Churchhouse, R. F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=202096">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Versteckte Botschaften : die faszinierende Geschichte der Steganografie ent://SD_ILS/0/SD_ILS:2314676 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format:&#160;Electronic Resources<br/> American cryptology : two centuries of tradition ent://SD_ILS/0/SD_ILS:2290890 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;United States. National Security Agency.<br/><a href="https://learning.oreilly.com/library/view/~/01120100038SI">https://learning.oreilly.com/library/view/~/01120100038SI</a> <a href="https://learning.oreilly.com/library/view/~/01120100038SI/?ar">https://learning.oreilly.com/library/view/~/01120100038SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100038SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100038SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> Code breakers : inside the shadow world of signals intelligence in Australia's two Bletchley Parks ent://SD_ILS/0/SD_ILS:2144116 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Collie, Craig, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4826585">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic agility and interoperability : proceedings of a workshop ent://SD_ILS/0/SD_ILS:2229731 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Johnson, Anne Frances, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987115">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of cryptology ent://SD_ILS/0/SD_ILS:256883 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Newton, David E.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1475">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1475</a><br/>Format:&#160;Electronic Resources<br/> Journal of cryptology : the journal of the International Association for Cryptologic Research. ent://SD_ILS/0/SD_ILS:229880 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;International Association for Cryptologic Research.<br/>Format:&#160;Continuing Resources<br/> Cryptologia. ent://SD_ILS/0/SD_ILS:229793 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Albion College. Dept. of Mathematics.<br/>Format:&#160;Continuing Resources<br/> Advances on Superelliptic Curves and Their Applications. ent://SD_ILS/0/SD_ILS:1336507 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Beshaj, L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3563926">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystems ent://SD_ILS/0/SD_ILS:57851 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Beyazıt, Mutlu.<br/><a href="http://hdl.handle.net/11147/3802">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Defining a sample template for governmental procurements of cryptographic products ent://SD_ILS/0/SD_ILS:16935 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Taş, Levent.<br/><a href="http://hdl.handle.net/11147/3340">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Privacy-Preserving rare disease analysis with fully homomorphic encryption ent://SD_ILS/0/SD_ILS:2342587 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Akkaya, G&uuml;liz, author.<br/><a href="https://hdl.handle.net/11147/13937">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Quantum Communication and Security. ent://SD_ILS/0/SD_ILS:1195945 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kilin, S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=320309">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Masked dispatches : cryptograms and cryptology in American history, 1775-1900 ent://SD_ILS/0/SD_ILS:2304646 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Weber, Ralph E. (Ralph Edward), 1926- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100005SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100005SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100005SI/?ar">https://learning.oreilly.com/library/view/~/01120100005SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100005SI">https://learning.oreilly.com/library/view/~/01120100005SI</a><br/>Format:&#160;Electronic Resources<br/> The history of information security a comprehensive handbook ent://SD_ILS/0/SD_ILS:64198 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Sharing the burden : women in cryptology during World War II ent://SD_ILS/0/SD_ILS:2304647 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wilcox, Jennifer E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100014SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100014SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100014SI">https://learning.oreilly.com/library/view/~/01120100014SI</a> <a href="https://learning.oreilly.com/library/view/~/01120100014SI/?ar">https://learning.oreilly.com/library/view/~/01120100014SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secret messages : codebreaking and American diplomacy, 1930-1945 ent://SD_ILS/0/SD_ILS:2374976 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Alvarez, David J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5343520">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Rare books in the National Cryptologic Museum. ent://SD_ILS/0/SD_ILS:2310185 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;United States. National Security Agency/Central Security Service. Center for Cryptologic History.<br/><a href="https://learning.oreilly.com/library/view/~/01120100043SI/?ar">https://learning.oreilly.com/library/view/~/01120100043SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100043SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100043SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100043SI">https://learning.oreilly.com/library/view/~/01120100043SI</a><br/>Format:&#160;Electronic Resources<br/> Codebreakers' Victory : How the Allied Cryptographers Won World War II. ent://SD_ILS/0/SD_ILS:2090145 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Haufler, Hervie.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1806109">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptanalysis of number theretic ciphers ent://SD_ILS/0/SD_ILS:11983 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wagstaff, Samuel S.<br/>Format:&#160;Books<br/> Quantum computing : progress and prospects ent://SD_ILS/0/SD_ILS:2232039 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Grumbling, Emily, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742474">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptologic aspects of German intelligence activities in South America during World War II ent://SD_ILS/0/SD_ILS:2291954 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mowry, David P., author.<br/><a href="https://learning.oreilly.com/library/view/~/01120100040SI">https://learning.oreilly.com/library/view/~/01120100040SI</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100040SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100040SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100040SI/?ar">https://learning.oreilly.com/library/view/~/01120100040SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> Modelling of Turkey Turkish words by Discretemarkov processes ent://SD_ILS/0/SD_ILS:7862 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;G&uuml;vent&uuml;rk, Jale.<br/><a href="http://hdl.handle.net/11147/3872">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Secure Multi-Party Computation. ent://SD_ILS/0/SD_ILS:1255568 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Prabhakaran, M.M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137458">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced Linear Cryptanalysis of Block and Stream Ciphers. ent://SD_ILS/0/SD_ILS:1237726 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Junod, P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836210">Click to View</a><br/>Format:&#160;Electronic Resources<br/> B92 based quantum key distribution with faint pulsed laser ent://SD_ILS/0/SD_ILS:2260572 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Mutlu, G&ouml;rkem, author.<br/><a href="https://hdl.handle.net/11147/12024">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Eavesdropping on hell : historical guide to Western communications intelligence and the Holocaust, 1939-1945 ent://SD_ILS/0/SD_ILS:2282556 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hanyok, Robert J.<br/><a href="https://learning.oreilly.com/library/view/~/01120090002SI">https://learning.oreilly.com/library/view/~/01120090002SI</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120090002SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120090002SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120090002SI/?ar">https://learning.oreilly.com/library/view/~/01120090002SI/?ar</a><br/>Format:&#160;Electronic Resources<br/> American signal intelligence in Northwest Africa and Western Europe ent://SD_ILS/0/SD_ILS:2290033 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Howe, George F. (George Frederick), 1901-1988.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100011SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100011SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100011SI/?ar">https://learning.oreilly.com/library/view/~/01120100011SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100011SI">https://learning.oreilly.com/library/view/~/01120100011SI</a><br/>Format:&#160;Electronic Resources<br/> The quest for cryptologic centralization and the establishment of NSA : 1940-1952 ent://SD_ILS/0/SD_ILS:2289600 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Burns, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/01120100006SI/?ar">https://learning.oreilly.com/library/view/~/01120100006SI/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/01120100006SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100006SI/?ar</a> <a href="https://learning.oreilly.com/library/view/~/01120100006SI">https://learning.oreilly.com/library/view/~/01120100006SI</a><br/>Format:&#160;Electronic Resources<br/> Understanding cryptocurrencies : the money of the future ent://SD_ILS/0/SD_ILS:2156656 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Matharu, Arvind, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5604915">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Elementary Cryptanalysis. ent://SD_ILS/0/SD_ILS:1314207 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Sinkov, Abraham.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3330402">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:2212072 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4835216">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hands-on bitcoin programming with Python : build powerful online payment centric applications with Python ent://SD_ILS/0/SD_ILS:2215085 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Garg, Harish Kumar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5504928">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Morse code Wrens of Station X : Bletchley's outer circle ent://SD_ILS/0/SD_ILS:2063263 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Glyn-Jones, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4879160">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Siber g&uuml;venlik ve savunma : farkındalık ve caydırıcılık ent://SD_ILS/0/SD_ILS:2261041 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Sağıroğlu, Şeref, editor author.<br/>Format:&#160;Books<br/> Siber g&uuml;venlik ve savunma : problemler ve &ccedil;&ouml;z&uuml;mler ent://SD_ILS/0/SD_ILS:2261043 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Sağıroğlu, Şeref, editor. author.<br/>Format:&#160;Books<br/> Secret cables of the Comintern, 1933-1943 ent://SD_ILS/0/SD_ILS:2271259 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Firsov, Fridrikh Igorevich, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3421435">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Breaking Japanese diplomatic codes : David Sissons and D Special Section during the Second World War ent://SD_ILS/0/SD_ILS:2098920 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ball, Desmond, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4585027">Click to View</a><br/>Format:&#160;Electronic Resources<br/> An analysis of key generation efficiency of rsa cryptos ystem in distributed environments ent://SD_ILS/0/SD_ILS:16934 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;&Ccedil;ağrıcı, G&ouml;khan.<br/><a href="http://hdl.handle.net/11147/3339">Access to Electronic Version.</a><br/>Format:&#160;Manuscript<br/> Mercury : The Secret and Swift Messenger: Showing How a Man with Privacy and Speed May Communicate His Thoughts to a Friend at Any Distance (1707). ent://SD_ILS/0/SD_ILS:1290850 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Wilkins, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016015">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cours d'alg&egrave;bre et d'algorithmique : applications &agrave; la cryptologie du RSA et du logarithme discret ent://SD_ILS/0/SD_ILS:2123678 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Meunier, Pierre, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709822">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Algebraic Geometry Modeling in Information Theory. ent://SD_ILS/0/SD_ILS:1255928 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Martinez-Moro, Edgar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143318">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Development of long distance free-space quantum key distribution system ent://SD_ILS/0/SD_ILS:2378580 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Tapşın, &Ouml;mer Salih, author.<br/><a href="https://hdl.handle.net/11147/15148">Access to Electronic Versiyon.</a><br/>Format:&#160;Manuscript<br/> Secret duties of a signals interceptor : working with Bletchley Park, the SDS and the OSS, or, a long time to hope ent://SD_ILS/0/SD_ILS:2062118 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Nater, Jenny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4799722">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Mathematical recreations &amp; essays ent://SD_ILS/0/SD_ILS:2093284 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ball, W. W. Rouse (Walter William Rouse), 1850-1925, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4669422">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Finite fields and applications : Eighth International Conference on Finite Fields and Applications, July 9-13, 2007, Melbourne, Australia ent://SD_ILS/0/SD_ILS:2225998 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;International Conference on Finite Fields and Applications (8th : 2007 : Melbourne, Australia), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113265">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Secret Language : Codes, Tricks, Spies, Thieves, and Witchcraft. ent://SD_ILS/0/SD_ILS:1213340 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Blake, Barry J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=497604">Click to View</a><br/>Format:&#160;Electronic Resources<br/> zSeries Crypto Guide Update. ent://SD_ILS/0/SD_ILS:1310096 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306705">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Real Life Cryptology ent://SD_ILS/0/SD_ILS:2203877 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Lang, Benedek<br/><a href="https://library.oapen.org/bitstream/20.500.12657/28452/1/1001507.pdf">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/35937">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Internet and intranet security management risks and solutions ent://SD_ILS/0/SD_ILS:2261670 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Janczewski, Lech, 1943-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-87828-971-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-87828-971-1</a><br/>Format:&#160;Electronic Resources<br/> Modern cryptanalysis : techniques for advanced code breaking ent://SD_ILS/0/SD_ILS:2284627 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format:&#160;Electronic Resources<br/> zSeries Trusted Key Entry (TKE) V4.2 Update. ent://SD_ILS/0/SD_ILS:1310067 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306676">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions in Cryptology and Information Security. ent://SD_ILS/0/SD_ILS:1199290 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Preneel, B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363218">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Advanced Technologies of Quantum Key Distribution ent://SD_ILS/0/SD_ILS:2178525 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Sergiy Gnatyuk<br/><a href="https://www.intechopen.com/books/advanced-technologies-of-quantum-key-distribution">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/40216">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:2310966 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Shavers, Brett, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033524/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033524/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033524/?ar">https://learning.oreilly.com/library/view/~/9780128033524/?ar</a><br/>Format:&#160;Electronic Resources<br/> Partition-Based Trapdoor Ciphers ent://SD_ILS/0/SD_ILS:2168793 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Arnaud Bannier<br/><a href="https://www.intechopen.com/books/partition-based-trapdoor-ciphers">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/55737">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Blockchain and Cryptocurrencies ent://SD_ILS/0/SD_ILS:2180052 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Asma Salman<br/><a href="https://www.intechopen.com/books/blockchain-and-cryptocurrencies">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/42327">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Crypto ent://SD_ILS/0/SD_ILS:2331323 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a> <a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Code breakers and spies of the Cold War ent://SD_ILS/0/SD_ILS:2268082 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Hurt, Avery Elizabeth, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5733936">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurity ent://SD_ILS/0/SD_ILS:2321574 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a> <a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Identity-Based Encryption. ent://SD_ILS/0/SD_ILS:1197563 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Martin, Luther.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338784">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding and Cryptology : Proceedings of the First International Workshop. ent://SD_ILS/0/SD_ILS:1258347 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Li, Yongqing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193245">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity ent://SD_ILS/0/SD_ILS:2321448 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Watermarking Techniques : Series On Innovative Intelligence. ent://SD_ILS/0/SD_ILS:1183629 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Pan, Jeng-Shyang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231561">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Coding theory and quantum computing : an International Conference on Coding Theory and Quantum Computing, May 20-24, 2003, University of Virginia ent://SD_ILS/0/SD_ILS:2225911 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;International Conference on Coding Theory and Quantum Computing (2003 : University of Virginia), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113178">Click to View</a><br/>Format:&#160;Electronic Resources<br/> User's Guide tp Crytography and Standards. ent://SD_ILS/0/SD_ILS:1183367 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Dent, Alex.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227658">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Applied Public Key Infrastructure : 4th International Workshop: IWAP 2005. ent://SD_ILS/0/SD_ILS:1186795 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Zhou, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=265956">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Modelling Cyber Security : Approaches, Methodology, Strategies. ent://SD_ILS/0/SD_ILS:1213485 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Gori, U.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=501456">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The broken seal : 'Operation Magic' and the secret road to Pearl Harbor' ent://SD_ILS/0/SD_ILS:2274431 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Fargo, Ladislas, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176465">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Alice and Bob learn application security. ent://SD_ILS/0/SD_ILS:2325958 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a> <a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Reader of Gentlemen&rsquo;s Mail : Herbert O. Yardley and American Intelligence. ent://SD_ILS/0/SD_ILS:1330968 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kahn, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3420152">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity ent://SD_ILS/0/SD_ILS:2325451 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a> <a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hashing in Computer Science : Fifty Years of Slicing and Dicing. ent://SD_ILS/0/SD_ILS:1215673 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:2289360 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format:&#160;Electronic Resources<br/> Information theory ent://SD_ILS/0/SD_ILS:2055776 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Alencar, Marcelo S., 1957-, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1826004">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War ent://SD_ILS/0/SD_ILS:2202636 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Ball, Desmond<br/><a href="https://library.oapen.org/bitstream/20.500.12657/33529/1/459995.pdf">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/34520">DOAB: description of the publication</a><br/>Format:&#160;Books<br/> Security : Secrets, Intruders and ID Tags. ent://SD_ILS/0/SD_ILS:1326744 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:2299055 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Bahi, Jacques Mohcine, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466554511">https://learning.oreilly.com/library/view/~/9781466554511</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar">https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466554511/?ar">https://learning.oreilly.com/library/view/~/9781466554511/?ar</a><br/>Format:&#160;Electronic Resources<br/> Nanomechanics and Nanoelectronics : Molecule-Size Machines. ent://SD_ILS/0/SD_ILS:1326745 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411448">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Optical coding theory with prime ent://SD_ILS/0/SD_ILS:2299278 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;Kwong, Wing C.<br/><a href="https://learning.oreilly.com/library/view/~/9781466567818">https://learning.oreilly.com/library/view/~/9781466567818</a> <a href="https://learning.oreilly.com/library/view/~/9781466567818/?ar">https://learning.oreilly.com/library/view/~/9781466567818/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466567818/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567818/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mistrust -- Ethnographic Approximations ent://SD_ILS/0/SD_ILS:2199407 2025-09-07T04:42:42Z 2025-09-07T04:42:42Z by&#160;M&uuml;hlfried, Florian<br/><a href="https://library.oapen.org/bitstream/20.500.12657/30739/1/643130.pdf">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/31434">DOAB: description of the publication</a><br/>Format:&#160;Books<br/>