Arama Sonuçları Cryptography.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026ps$003d300?dt=list2025-09-07T04:42:42ZCryptography.ent://SD_ILS/0/SD_ILS:23420562025-09-07T04:42:42Z2025-09-07T04:42:42Zby Buchanan, William.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=30251706">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographyent://SD_ILS/0/SD_ILS:22368252025-09-07T04:42:42Z2025-09-07T04:42:42Zby Anderson, Rane, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5881542">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographyent://SD_ILS/0/SD_ILS:21444502025-09-07T04:42:42Z2025-09-07T04:42:42Zby Buchanan, William J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5050193">Click to View</a><br/>Format: Electronic Resources<br/>Contemporary Cryptography.ent://SD_ILS/0/SD_ILS:11836472025-09-07T04:42:42Z2025-09-07T04:42:42Zby Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231638">Click to View</a><br/>Format: Electronic Resources<br/>Java cryptographyent://SD_ILS/0/SD_ILS:22806012025-09-07T04:42:42Z2025-09-07T04:42:42Zby Knudsen, Jonathan.<br/><a href="https://learning.oreilly.com/library/view/~/1565924029">https://learning.oreilly.com/library/view/~/1565924029</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1565924029/?ar">https://go.oreilly.com/library-access/library/view/-/1565924029/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1565924029/?ar">https://learning.oreilly.com/library/view/~/1565924029/?ar</a><br/>Format: Electronic Resources<br/>Contemporary Cryptography.ent://SD_ILS/0/SD_ILS:12640692025-09-07T04:42:42Z2025-09-07T04:42:42Zby Oppliger, Rolf.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1531534">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography Made Simpleent://SD_ILS/0/SD_ILS:20845492025-09-07T04:42:42Z2025-09-07T04:42:42Zby Smart, Nigel P. author.<br/><a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23303832025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wong, David (Cryptography engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710">https://learning.oreilly.com/library/view/~/9781617296710</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710/?ar">https://learning.oreilly.com/library/view/~/9781617296710/?ar</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23328082025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wong, David (Cryptography engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781617296710AU">https://learning.oreilly.com/library/view/~/9781617296710AU</a>
<a href="https://learning.oreilly.com/library/view/~/9781617296710AU/?ar">https://learning.oreilly.com/library/view/~/9781617296710AU/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710AU/?ar</a><br/>Format: Sound recording<br/>Group theoretic cryptographyent://SD_ILS/0/SD_ILS:23067632025-09-07T04:42:42Z2025-09-07T04:42:42Zby González Vasco, Maria Isabel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar">https://go.oreilly.com/library-access/library/view/-/9781584888369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781584888369/?ar">https://learning.oreilly.com/library/view/~/9781584888369/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781584888369">https://learning.oreilly.com/library/view/~/9781584888369</a><br/>Format: Electronic Resources<br/>Group theoretic cryptographyent://SD_ILS/0/SD_ILS:22705022025-09-07T04:42:42Z2025-09-07T04:42:42Zby González Vasco, María Isabel, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1619960">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography cracking codesent://SD_ILS/0/SD_ILS:13859972025-09-07T04:42:42Z2025-09-07T04:42:42Zby Curley, Robert.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1220658">Click to View</a><br/>Format: Electronic Resources<br/>Introduction to cryptographyent://SD_ILS/0/SD_ILS:23554282025-09-07T04:42:42Z2025-09-07T04:42:42Zby Padhye, Sahadeo, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5508462">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography for developersent://SD_ILS/0/SD_ILS:641892025-09-07T04:42:42Z2025-09-07T04:42:42Zby St. Denis, Tom.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Cryptography for Developers.ent://SD_ILS/0/SD_ILS:11958452025-09-07T04:42:42Z2025-09-07T04:42:42Zby St Denis, Tom.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=319199">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography for developersent://SD_ILS/0/SD_ILS:22836382025-09-07T04:42:42Z2025-09-07T04:42:42Zby St. Denis, Tom.<br/><a href="https://www.sciencedirect.com/science/book/9781597491044">https://www.sciencedirect.com/science/book/9781597491044</a>
<a href="https://learning.oreilly.com/library/view/~/1597491047">https://learning.oreilly.com/library/view/~/1597491047</a>
<a href="https://go.oreilly.com/library-access/library/view/-/1597491047/?ar">https://go.oreilly.com/library-access/library/view/-/1597491047/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/1597491047/?ar">https://learning.oreilly.com/library/view/~/1597491047/?ar</a><br/>Format: Electronic Resources<br/>Real-world cryptographyent://SD_ILS/0/SD_ILS:23321502025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wong, David, presenter.<br/><a href="https://learning.oreilly.com/videos/~/9781617296710VE">https://learning.oreilly.com/videos/~/9781617296710VE</a>
<a href="https://learning.oreilly.com/videos/~/9781617296710VE/?ar">https://learning.oreilly.com/videos/~/9781617296710VE/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar">https://go.oreilly.com/library-access/library/view/-/9781617296710VE/?ar</a><br/>Format: Video recording<br/>Group-based Cryptographyent://SD_ILS/0/SD_ILS:5039392025-09-07T04:42:42Z2025-09-07T04:42:42Zby Myasnikov, Alexei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format: Electronic Resources<br/>Cryptography: theory practiceent://SD_ILS/0/SD_ILS:111362025-09-07T04:42:42Z2025-09-07T04:42:42Zby Stinson,Douglas R. (Douglas Robert), 1956-<br/>Format: Books<br/>. Net Security and Cryptography.ent://SD_ILS/0/SD_ILS:23178962025-09-07T04:42:42Z2025-09-07T04:42:42Zby Thorsteinson, Peter, author.<br/><a href="https://learning.oreilly.com/library/view/~/013100851X">https://learning.oreilly.com/library/view/~/013100851X</a>
<a href="https://learning.oreilly.com/library/view/~/013100851X/?ar">https://learning.oreilly.com/library/view/~/013100851X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/013100851X/?ar">https://go.oreilly.com/library-access/library/view/-/013100851X/?ar</a><br/>Format: Electronic Resources<br/>Cryptography : Infosec pro guideent://SD_ILS/0/SD_ILS:23011652025-09-07T04:42:42Z2025-09-07T04:42:42Zby Oriyano, Sean-Philip.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071794251/?ar">https://go.oreilly.com/library-access/library/view/-/9780071794251/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071794251/?ar">https://learning.oreilly.com/library/view/~/9780071794251/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071794251">https://learning.oreilly.com/library/view/~/9780071794251</a><br/>Format: Electronic Resources<br/>Implementing cryptography using Pythonent://SD_ILS/0/SD_ILS:23251482025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bray, Shannon, 1972-<br/><a href="https://learning.oreilly.com/library/view/~/9781119612209">https://learning.oreilly.com/library/view/~/9781119612209</a>
<a href="https://learning.oreilly.com/library/view/~/9781119612209/?ar">https://learning.oreilly.com/library/view/~/9781119612209/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119612209/?ar">https://go.oreilly.com/library-access/library/view/-/9781119612209/?ar</a><br/>Format: Electronic Resources<br/>Quantum Cryptography and Computing.ent://SD_ILS/0/SD_ILS:12905732025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kilin, S.Ya.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3014999">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:23144162025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bose, S., author.<br/><a href="https://learning.oreilly.com/library/view/~/9789332579125/?ar">https://learning.oreilly.com/library/view/~/9789332579125/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar">https://go.oreilly.com/library-access/library/view/-/9789332579125/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9789332579125">https://learning.oreilly.com/library/view/~/9789332579125</a><br/>Format: Electronic Resources<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:22830572025-09-07T04:42:42Z2025-09-07T04:42:42Zby Konheim, Alan G., 1934-<br/><a href="https://learning.oreilly.com/library/view/~/9780471947837">https://learning.oreilly.com/library/view/~/9780471947837</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar">https://go.oreilly.com/library-access/library/view/-/9780471947837/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471947837/?ar">https://learning.oreilly.com/library/view/~/9780471947837/?ar</a><br/>Format: Electronic Resources<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:23102812025-09-07T04:42:42Z2025-09-07T04:42:42Zby Young, Adam, 1972- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar">https://go.oreilly.com/library-access/library/view/-/9780764568466/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466">https://learning.oreilly.com/library/view/~/9780764568466</a>
<a href="https://learning.oreilly.com/library/view/~/9780764568466/?ar">https://learning.oreilly.com/library/view/~/9780764568466/?ar</a><br/>Format: Electronic Resources<br/>Implementing cryptography using pythonent://SD_ILS/0/SD_ILS:22746522025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bray, Shannon, 1972- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6265337">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography : theory and practiceent://SD_ILS/0/SD_ILS:22804152025-09-07T04:42:42Z2025-09-07T04:42:42Zby Stinson, Douglas R. (Douglas Robert), 1956- author<br/>Format: Books<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:22959512025-09-07T04:42:42Z2025-09-07T04:42:42Zby ITL Education Solutions. Research and Development Wing.<br/><a href="https://learning.oreilly.com/library/view/~/9788131764527/?ar">https://learning.oreilly.com/library/view/~/9788131764527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131764527">https://learning.oreilly.com/library/view/~/9788131764527</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar">https://go.oreilly.com/library-access/library/view/-/9788131764527/?ar</a><br/>Format: Electronic Resources<br/>Cryptography : Protocols, Design, and Applications.ent://SD_ILS/0/SD_ILS:12939102025-09-07T04:42:42Z2025-09-07T04:42:42Zby Lek, Kamol.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3021394">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:22821262025-09-07T04:42:42Z2025-09-07T04:42:42Zby Welschenbach, Michael.<br/><a href="https://learning.oreilly.com/library/view/~/9781590595022">https://learning.oreilly.com/library/view/~/9781590595022</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar">https://go.oreilly.com/library-access/library/view/-/9781590595022/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781590595022/?ar">https://learning.oreilly.com/library/view/~/9781590595022/?ar</a><br/>Format: Electronic Resources<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:21089372025-09-07T04:42:42Z2025-09-07T04:42:42Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5475691">Click to View</a><br/>Format: Electronic Resources<br/>Quantum Cryptography : Potentially Perfect Security.ent://SD_ILS/0/SD_ILS:13267212025-09-07T04:42:42Z2025-09-07T04:42:42Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411424">Click to View</a><br/>Format: Electronic Resources<br/>An Introduction to Mathematical Cryptography.ent://SD_ILS/0/SD_ILS:12023542025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hoffstein, Jeffrey.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=416993">Click to View</a><br/>Format: Electronic Resources<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:21299902025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1165936">Click to View</a><br/>Format: Electronic Resources<br/>Information theory : coding and cryptographyent://SD_ILS/0/SD_ILS:23041642025-09-07T04:42:42Z2025-09-07T04:42:42Zby Saha, A. (Arjit)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9788131797495/?ar">https://go.oreilly.com/library-access/library/view/-/9788131797495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131797495/?ar">https://learning.oreilly.com/library/view/~/9788131797495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9788131797495">https://learning.oreilly.com/library/view/~/9788131797495</a><br/>Format: Electronic Resources<br/>The manga guide to cryptographyent://SD_ILS/0/SD_ILS:22323762025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mitani, Masaaki, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5790493">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on cryptography with Javaent://SD_ILS/0/SD_ILS:23191242025-09-07T04:42:42Z2025-09-07T04:42:42Zby Costlow, Erik, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar">https://go.oreilly.com/library-access/library/view/-/9781838554972/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781838554972/?ar">https://learning.oreilly.com/videos/~/9781838554972/?ar</a><br/>Format: Electronic Resources<br/>Modern Cryptography for Cybersecurity Professionalsent://SD_ILS/0/SD_ILS:23291132025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bock, Lisa, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781838644352/?ar">https://go.oreilly.com/library-access/library/view/-/9781838644352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838644352/?ar">https://learning.oreilly.com/library/view/~/9781838644352/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781838644352">https://learning.oreilly.com/library/view/~/9781838644352</a><br/>Format: Electronic Resources<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:5077262025-09-07T04:42:42Z2025-09-07T04:42:42Zby Welschenbach, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format: Electronic Resources<br/>Guide to elliptic curve cryptographyent://SD_ILS/0/SD_ILS:23357662025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hankerson, Darrel R., author<br/>Format: Books<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:5019382025-09-07T04:42:42Z2025-09-07T04:42:42Zby Silverman, J.H. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782025-09-07T04:42:42Z2025-09-07T04:42:42Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography Principles and Applicationsent://SD_ILS/0/SD_ILS:5119462025-09-07T04:42:42Z2025-09-07T04:42:42Zby Delfs, Hans. author.<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format: Electronic Resources<br/>Advances in Coding Theory and Cryptography.ent://SD_ILS/0/SD_ILS:12583482025-09-07T04:42:42Z2025-09-07T04:42:42Zby Shaska, Tanush.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193247">Click to View</a><br/>Format: Electronic Resources<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:22925112025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cimato, Stelvio.<br/><a href="https://learning.oreilly.com/library/view/~/9781439837221/?ar">https://learning.oreilly.com/library/view/~/9781439837221/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439837221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439837221/?ar</a><br/>Format: Electronic Resources<br/>Visual cryptography and secret image sharingent://SD_ILS/0/SD_ILS:21314322025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cimato, Stelvio.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1449352">Click to View</a><br/>Format: Electronic Resources<br/>Understanding bitcoin : cryptography, engineering and economicsent://SD_ILS/0/SD_ILS:23048192025-09-07T04:42:42Z2025-09-07T04:42:42Zby Franco, Pedro.<br/><a href="https://learning.oreilly.com/library/view/~/9781119019145">https://learning.oreilly.com/library/view/~/9781119019145</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119019145/?ar">https://go.oreilly.com/library-access/library/view/-/9781119019145/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119019145/?ar">https://learning.oreilly.com/library/view/~/9781119019145/?ar</a><br/>Format: Electronic Resources<br/>SSCP video course. Domain 5, Cryptographyent://SD_ILS/0/SD_ILS:22867472025-09-07T04:42:42Z2025-09-07T04:42:42Zby Harris, Shon.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780789741943/?ar">https://go.oreilly.com/library-access/library/view/-/9780789741943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780789741943/?ar">https://learning.oreilly.com/videos/~/9780789741943/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780789741943">https://learning.oreilly.com/videos/~/9780789741943</a><br/>Format: Electronic Resources<br/>Understanding Bitcoin : Cryptography, Engineering and Economics.ent://SD_ILS/0/SD_ILS:12777492025-09-07T04:42:42Z2025-09-07T04:42:42Zby Franco, Pedro.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1823060">Click to View</a><br/>Format: Electronic Resources<br/>Everyday Cryptography Fundamental Principles and Applicationsent://SD_ILS/0/SD_ILS:5281092025-09-07T04:42:42Z2025-09-07T04:42:42Zby Martin, Keith M.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format: Electronic Resources<br/>Public-key cryptography : theory and practiceent://SD_ILS/0/SD_ILS:22906532025-09-07T04:42:42Z2025-09-07T04:42:42Zby Das, Abhijit, 1968-<br/><a href="https://learning.oreilly.com/library/view/~/9788131708323/?ar">https://learning.oreilly.com/library/view/~/9788131708323/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9788131708323/?ar">https://go.oreilly.com/library-access/library/view/-/9788131708323/?ar</a><br/>Format: Electronic Resources<br/>The mathematics of public key cryptographyent://SD_ILS/0/SD_ILS:20911102025-09-07T04:42:42Z2025-09-07T04:42:42Zby Galbraith, Steven D.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=866868">Click to View</a><br/>Format: Electronic Resources<br/>Disappearing cryptography information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:656792025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wayner, Peter, 1964-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">An electronic book accessible through the World Wide Web; click for information</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els031/2001099790.html">http://www.loc.gov/catdir/description/els031/2001099790.html</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els031/2001099790.html">http://www.loc.gov/catdir/toc/els031/2001099790.html</a><br/>Format: Electronic Resources<br/>Disappearing cryptography : information hiding, steganography & watermarkingent://SD_ILS/0/SD_ILS:22875802025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9780123744791/?ar">https://learning.oreilly.com/library/view/~/9780123744791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar">https://go.oreilly.com/library-access/library/view/-/9780123744791/?ar</a><br/>Format: Electronic Resources<br/>Disappearing cryptography : information hiding : steganography & watermarkingent://SD_ILS/0/SD_ILS:22807522025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wayner, Peter, 1964-<br/><a href="https://learning.oreilly.com/library/view/~/9781558607699/?ar">https://learning.oreilly.com/library/view/~/9781558607699/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar">https://go.oreilly.com/library-access/library/view/-/9781558607699/?ar</a><br/>Format: Electronic Resources<br/>Elliptic curves : number theory and cryptographyent://SD_ILS/0/SD_ILS:22848952025-09-07T04:42:42Z2025-09-07T04:42:42Zby Washington, Lawrence C.<br/><a href="https://learning.oreilly.com/library/view/~/9781420071474">https://learning.oreilly.com/library/view/~/9781420071474</a>
<a href="https://learning.oreilly.com/library/view/~/9781420071474/?ar">https://learning.oreilly.com/library/view/~/9781420071474/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420071474/?ar">https://go.oreilly.com/library-access/library/view/-/9781420071474/?ar</a><br/>Format: Electronic Resources<br/>Number Story : From Counting to Cryptography.ent://SD_ILS/0/SD_ILS:11974382025-09-07T04:42:42Z2025-09-07T04:42:42Zby Higgins, Peter Michael.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=336634">Click to View</a><br/>Format: Electronic Resources<br/>Basics Of Contemporary Cryptography For It Practitioners.ent://SD_ILS/0/SD_ILS:11925022025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ryabko , Boris.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=296069">Click to View</a><br/>Format: Electronic Resources<br/>Java cryptography extensions practical guide for programmersent://SD_ILS/0/SD_ILS:656572025-09-07T04:42:42Z2025-09-07T04:42:42Zby Weiss, Jason.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">An electronic book accessible through the World Wide Web; click for information</a>
Table of contents <a href="http://www.loc.gov/catdir/toc/els051/2003070900.html">http://www.loc.gov/catdir/toc/els051/2003070900.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/els041/2003070900.html">http://www.loc.gov/catdir/description/els041/2003070900.html</a><br/>Format: Electronic Resources<br/>Practical cryptography : algorithms and implementations using C++ent://SD_ILS/0/SD_ILS:23048182025-09-07T04:42:42Z2025-09-07T04:42:42Zby Azad, Saiful.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781482228892/?ar">https://go.oreilly.com/library-access/library/view/-/9781482228892/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781482228892/?ar">https://learning.oreilly.com/library/view/~/9781482228892/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Cryptography with Open-Source Software.ent://SD_ILS/0/SD_ILS:23070162025-09-07T04:42:42Z2025-09-07T04:42:42Zby McAndrew, Alasdair.<br/><a href="https://learning.oreilly.com/library/view/~/9781439825716">https://learning.oreilly.com/library/view/~/9781439825716</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar">https://go.oreilly.com/library-access/library/view/-/9781439825716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439825716/?ar">https://learning.oreilly.com/library/view/~/9781439825716/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and network security: principles and practiceent://SD_ILS/0/SD_ILS:118682025-09-07T04:42:42Z2025-09-07T04:42:42Zby Stallings, William.<br/>Format: Books<br/>Cryptography and security services mechanisms and applicationsent://SD_ILS/0/SD_ILS:22612652025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mogollon, Manuel.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-837-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-837-6</a><br/>Format: Electronic Resources<br/>Implementing SSL / TLS Using Cryptography and PKI.ent://SD_ILS/0/SD_ILS:12289192025-09-07T04:42:42Z2025-09-07T04:42:42Zby Davies, Joshua.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=706899">Click to View</a><br/>Format: Electronic Resources<br/>A course in number theory and cryptography.ent://SD_ILS/0/SD_ILS:9042025-09-07T04:42:42Z2025-09-07T04:42:42Zby Koblitz, Neal, 1948-<br/>Format: Books<br/>Handbook of elliptic and hyperelliptic curve cryptographyent://SD_ILS/0/SD_ILS:473982025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cohen, Henri, editor.<br/>Format: Books<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:21317082025-09-07T04:42:42Z2025-09-07T04:42:42Zby McAndrew, Alasdair, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1633743">Click to View</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:23081772025-09-07T04:42:42Z2025-09-07T04:42:42Zby Tokareva, Natalia, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128025550">https://learning.oreilly.com/library/view/~/9780128025550</a>
<a href="https://learning.oreilly.com/library/view/~/9780128025550/?ar">https://learning.oreilly.com/library/view/~/9780128025550/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128025550/?ar">https://go.oreilly.com/library-access/library/view/-/9780128025550/?ar</a><br/>Format: Electronic Resources<br/>Bent functions : results and applications to cryptographyent://SD_ILS/0/SD_ILS:20981522025-09-07T04:42:42Z2025-09-07T04:42:42Zby Tokareva, Natalia, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=2192079">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography Learn Public Key Infrastructure from Scratchent://SD_ILS/0/SD_ILS:23270912025-09-07T04:42:42Z2025-09-07T04:42:42Zby Rana, Himanshu VerfasserIn.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781800565463/?ar">https://go.oreilly.com/library-access/library/view/-/9781800565463/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800565463/?ar">https://learning.oreilly.com/videos/~/9781800565463/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781800565463">https://learning.oreilly.com/videos/~/9781800565463</a><br/>Format: Electronic Resources<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:5072292025-09-07T04:42:42Z2025-09-07T04:42:42Zby Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Exercise Bookent://SD_ILS/0/SD_ILS:5048372025-09-07T04:42:42Z2025-09-07T04:42:42Zby Baigèneres, Thomas. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format: Electronic Resources<br/>A course in number theory and cryptographyent://SD_ILS/0/SD_ILS:22252152025-09-07T04:42:42Z2025-09-07T04:42:42Zby Koblitz, Neal, 1948- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3074527">Click to View</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:20845702025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:22909662025-09-07T04:42:42Z2025-09-07T04:42:42Zby Davies, Joshua A. (Joshua Aaron)<br/><a href="https://learning.oreilly.com/library/view/~/9780470920411/?ar">https://learning.oreilly.com/library/view/~/9780470920411/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar">https://go.oreilly.com/library-access/library/view/-/9780470920411/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470920411">https://learning.oreilly.com/library/view/~/9780470920411</a><br/>Format: Electronic Resources<br/>Coding and Cryptography : Synergy for a Robust Communication.ent://SD_ILS/0/SD_ILS:12619532025-09-07T04:42:42Z2025-09-07T04:42:42Zby Zivic, Natasa.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1377173">Click to View</a><br/>Format: Electronic Resources<br/>Identity-Based Cryptography : Cryptology and Information Security Series.ent://SD_ILS/0/SD_ILS:12050972025-09-07T04:42:42Z2025-09-07T04:42:42Zby Joye, M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=433453">Click to View</a><br/>Format: Electronic Resources<br/>IBM eServer zSeries 990 (z990) Cryptography Implementation.ent://SD_ILS/0/SD_ILS:13101822025-09-07T04:42:42Z2025-09-07T04:42:42Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306791">Click to View</a><br/>Format: Electronic Resources<br/>IBM eserver zSeries 990 (z990) cryptography implementationent://SD_ILS/0/SD_ILS:22832922025-09-07T04:42:42Z2025-09-07T04:42:42Zby Rayns, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/0738490369">https://learning.oreilly.com/library/view/~/0738490369</a>
<a href="https://learning.oreilly.com/library/view/~/0738490369/?ar">https://learning.oreilly.com/library/view/~/0738490369/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0738490369/?ar">https://go.oreilly.com/library-access/library/view/-/0738490369/?ar</a><br/>Format: Electronic Resources<br/>Cryptography for Security and Privacy in Cloud Computing.ent://SD_ILS/0/SD_ILS:12632242025-09-07T04:42:42Z2025-09-07T04:42:42Zby Rass, Stefan.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1463547">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography's Role in Securing the Information Society.ent://SD_ILS/0/SD_ILS:13177992025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dam, Kenneth W.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3375712">Click to View</a><br/>Format: Electronic Resources<br/>Network security and cryptography : a self-teaching introductionent://SD_ILS/0/SD_ILS:22144602025-09-07T04:42:42Z2025-09-07T04:42:42Zby Musa, Sarhan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5389089">Click to View</a><br/>Format: Electronic Resources<br/>Fault Tolerant Architectures for Cryptography and Hardware Securityent://SD_ILS/0/SD_ILS:20869072025-09-07T04:42:42Z2025-09-07T04:42:42Zby PATRANABIS, SIKHAR. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format: Electronic Resources<br/>Secret key cryptography : ciphers, from simple to unbreakableent://SD_ILS/0/SD_ILS:23340942025-09-07T04:42:42Z2025-09-07T04:42:42Zby Rubin, Frank (Cryptographer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781633439795">https://learning.oreilly.com/library/view/~/9781633439795</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar">https://go.oreilly.com/library-access/library/view/-/9781633439795/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781633439795/?ar">https://learning.oreilly.com/library/view/~/9781633439795/?ar</a><br/>Format: Electronic Resources<br/>Discrete algebraic methods : arithmetic, cryptography, automata, and groupsent://SD_ILS/0/SD_ILS:20602392025-09-07T04:42:42Z2025-09-07T04:42:42Zby Diekert, Volker, 1955- author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4533883">Click to View</a><br/>Format: Electronic Resources<br/>Serious cryptography : a practical introduction to modern encryptionent://SD_ILS/0/SD_ILS:23162082025-09-07T04:42:42Z2025-09-07T04:42:42Zby Aumasson, Jean-Philippe, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492067511">https://learning.oreilly.com/library/view/~/9781492067511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar">https://go.oreilly.com/library-access/library/view/-/9781492067511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492067511/?ar">https://learning.oreilly.com/library/view/~/9781492067511/?ar</a><br/>Format: Electronic Resources<br/>Codes: An Introduction to Information Communication and Cryptographyent://SD_ILS/0/SD_ILS:5025372025-09-07T04:42:42Z2025-09-07T04:42:42Zby Biggs, N.L. author.<br/><a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format: Electronic Resources<br/>Transitioning to quantum-safe cryptography on IBM Zent://SD_ILS/0/SD_ILS:23339332025-09-07T04:42:42Z2025-09-07T04:42:42Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738460680">https://learning.oreilly.com/library/view/~/9780738460680</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar">https://go.oreilly.com/library-access/library/view/-/9780738460680/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738460680/?ar">https://learning.oreilly.com/library/view/~/9780738460680/?ar</a><br/>Format: Electronic Resources<br/>Security for Wireless Sensor Networks using Identity-Based Cryptographyent://SD_ILS/0/SD_ILS:23272862025-09-07T04:42:42Z2025-09-07T04:42:42Zby Patil, Harsh, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439869024">https://learning.oreilly.com/library/view/~/9781439869024</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar">https://go.oreilly.com/library-access/library/view/-/9781439869024/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439869024/?ar">https://learning.oreilly.com/library/view/~/9781439869024/?ar</a><br/>Format: Electronic Resources<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:22882292025-09-07T04:42:42Z2025-09-07T04:42:42Zby Schneier, Bruce, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar">https://go.oreilly.com/library-access/library/view/-/9780471117094/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780471117094/?ar">https://learning.oreilly.com/library/view/~/9780471117094/?ar</a><br/>Format: Electronic Resources<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:23078102025-09-07T04:42:42Z2025-09-07T04:42:42Zby Schneier, Bruce, 1963- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119096726/?ar">https://go.oreilly.com/library-access/library/view/-/9781119096726/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119096726/?ar">https://learning.oreilly.com/library/view/~/9781119096726/?ar</a><br/>Format: Electronic Resources<br/>Authentication and access control : practical cryptography methods and toolsent://SD_ILS/0/SD_ILS:23271232025-09-07T04:42:42Z2025-09-07T04:42:42Zby Boonkrong, Sirapat, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265703/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703">https://learning.oreilly.com/library/view/~/9781484265703</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265703/?ar">https://learning.oreilly.com/library/view/~/9781484265703/?ar</a><br/>Format: Electronic Resources<br/>Modern cryptography : applied mathematics for encryption and information securityent://SD_ILS/0/SD_ILS:23095142025-09-07T04:42:42Z2025-09-07T04:42:42Zby Easttom, Chuck, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781259588099/?ar">https://go.oreilly.com/library-access/library/view/-/9781259588099/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781259588099">https://learning.oreilly.com/library/view/~/9781259588099</a>
<a href="https://learning.oreilly.com/library/view/~/9781259588099/?ar">https://learning.oreilly.com/library/view/~/9781259588099/?ar</a><br/>Format: Electronic Resources<br/>A Classical Introduction to Cryptography Applications for Communications Securityent://SD_ILS/0/SD_ILS:5044612025-09-07T04:42:42Z2025-09-07T04:42:42Zby Vaudenay, Serge. author.<br/><a href="http://dx.doi.org/10.1007/b136373">http://dx.doi.org/10.1007/b136373</a><br/>Format: Electronic Resources<br/>Algebraic Curves and Finite Fields : Cryptography and Other Applications.ent://SD_ILS/0/SD_ILS:12699412025-09-07T04:42:42Z2025-09-07T04:42:42Zby Achter, Jeffrey D.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1663205">Click to View</a><br/>Format: Electronic Resources<br/>Practical cryptography in Python : learning correct cryptography by exampleent://SD_ILS/0/SD_ILS:23223672025-09-07T04:42:42Z2025-09-07T04:42:42Zby Nielson, Seth James, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484249000/?ar">https://go.oreilly.com/library-access/library/view/-/9781484249000/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484249000/?ar">https://learning.oreilly.com/library/view/~/9781484249000/?ar</a><br/>Format: Electronic Resources<br/>CompTIA security+ SY0-201 video course. Domain 5, Cryptographyent://SD_ILS/0/SD_ILS:22872842025-09-07T04:42:42Z2025-09-07T04:42:42Zby Harris, Shon.<br/><a href="https://learning.oreilly.com/videos/~/9780789740069">https://learning.oreilly.com/videos/~/9780789740069</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780789740069/?ar">https://go.oreilly.com/library-access/library/view/-/9780789740069/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780789740069/?ar">https://learning.oreilly.com/videos/~/9780789740069/?ar</a><br/>Format: Electronic Resources<br/>Cryptography and cryptanalysis in MATLAB : creating and programming advanced algorithmsent://SD_ILS/0/SD_ILS:23300252025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mihailescu, Marius Iulian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484273340/?ar">https://learning.oreilly.com/library/view/~/9781484273340/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484273340/?ar">https://go.oreilly.com/library-access/library/view/-/9781484273340/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484273340">https://learning.oreilly.com/library/view/~/9781484273340</a><br/>Format: Electronic Resources<br/>Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Projectent://SD_ILS/0/SD_ILS:20875042025-09-07T04:42:42Z2025-09-07T04:42:42Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithmsent://SD_ILS/0/SD_ILS:20840602025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dooley, John F. author.<br/><a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format: Electronic Resources<br/>Encryption for organizations and individuals : basics of contemporary and quantum cryptographyent://SD_ILS/0/SD_ILS:23254632025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ciesla, Robert.<br/><a href="https://learning.oreilly.com/library/view/~/9781484260562">https://learning.oreilly.com/library/view/~/9781484260562</a>
<a href="https://learning.oreilly.com/library/view/~/9781484260562/?ar">https://learning.oreilly.com/library/view/~/9781484260562/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar">https://go.oreilly.com/library-access/library/view/-/9781484260562/?ar</a><br/>Format: Electronic Resources<br/>Group key establishment protocols: Pairing cryptography and verifiable secret sharing schemeent://SD_ILS/0/SD_ILS:4090092025-09-07T04:42:42Z2025-09-07T04:42:42Zby Aslanoğlu, Rabia.<br/><a href="http://hdl.handle.net/11147/3614">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>The physics of quantum information : quantum cryptography, quantum teleportation, quantum computationent://SD_ILS/0/SD_ILS:800522025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bouwmeester, Dirk, 1967-<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0815/00030749-d.html">http://www.loc.gov/catdir/enhancements/fy0815/00030749-d.html</a>
Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy0815/00030749-t.html">http://www.loc.gov/catdir/enhancements/fy0815/00030749-t.html</a><br/>Format: Books<br/>Pro cryptography and cryptanalysis : creating advanced algorithms with C# and .NETent://SD_ILS/0/SD_ILS:23275192025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mihailescu, Marius Iulian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484263679">https://learning.oreilly.com/library/view/~/9781484263679</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484263679/?ar">https://go.oreilly.com/library-access/library/view/-/9781484263679/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484263679/?ar">https://learning.oreilly.com/library/view/~/9781484263679/?ar</a><br/>Format: Electronic Resources<br/>Algorithmic problems of group theory, their complexity, and applications to cryptographyent://SD_ILS/0/SD_ILS:22270072025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kahrobaei, Delaram, 1975- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3114280">Click to View</a><br/>Format: Electronic Resources<br/>Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeitingent://SD_ILS/0/SD_ILS:5028652025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cole, Peter H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format: Electronic Resources<br/>The currency cold war : cash and cryptography, hash rates and hegemonyent://SD_ILS/0/SD_ILS:22783492025-09-07T04:42:42Z2025-09-07T04:42:42Zby Birch, David G. W., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6194230">Click to View</a><br/>Format: Electronic Resources<br/>International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019ent://SD_ILS/0/SD_ILS:21838292025-09-07T04:42:42Z2025-09-07T04:42:42Zby Takagi, Tsuyoshi<br/><a href="https://library.oapen.org/bitstream/20.500.12657/42930/1/2021_Book_InternationalSymposiumOnMathem.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/25889">DOAB: description of the publication</a><br/>Format: Books<br/>International Symposium on Mathematics, Quantum Theory, and Cryptography : Proceedings of MQC 2019ent://SD_ILS/0/SD_ILS:21824672025-09-07T04:42:42Z2025-09-07T04:42:42Zby Takagi, Tsuyoshi<br/><a href="https://library.oapen.org/bitstream/20.500.12657/46834/1/2021_Book_InternationalSymposiumOnMathem.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/63693">DOAB: description of the publication</a><br/>Format: Books<br/>Physics and Theoretical Computer Science : From Numbers and Languages to (quantum) Cryptography.ent://SD_ILS/0/SD_ILS:11932032025-09-07T04:42:42Z2025-09-07T04:42:42Zby Gazeau, J.-P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=305174">Click to View</a><br/>Format: Electronic Resources<br/>The code book : the secret history of codes and code-breaking cryptographyent://SD_ILS/0/SD_ILS:22803392025-09-07T04:42:42Z2025-09-07T04:42:42Zby Singh, Simon, author.<br/>Format: Books<br/>Pro cryptography and cryptanalysis with C++20 : creating and programming advanced algorithmsent://SD_ILS/0/SD_ILS:23275912025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mihailescu, Marius Iulian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484265864">https://learning.oreilly.com/library/view/~/9781484265864</a>
<a href="https://learning.oreilly.com/library/view/~/9781484265864/?ar">https://learning.oreilly.com/library/view/~/9781484265864/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484265864/?ar">https://go.oreilly.com/library-access/library/view/-/9781484265864/?ar</a><br/>Format: Electronic Resources<br/>The code book: the science of secrecy from ancient egypt to quantum cryptographyent://SD_ILS/0/SD_ILS:114202025-09-07T04:42:42Z2025-09-07T04:42:42Zby Singh, Simon.<br/>Format: Books<br/>Breaking the Unbreakable : Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography.ent://SD_ILS/0/SD_ILS:23636362025-09-07T04:42:42Z2025-09-07T04:42:42Zby Jogenfors, Jonathan.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5116594">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography apocalypse : preparing for the day when quantum computing breaks today's cryptoent://SD_ILS/0/SD_ILS:22737952025-09-07T04:42:42Z2025-09-07T04:42:42Zby Grimes, Roger A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5946044">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography apocalypse : preparing for the day when quantum computing breaks today's cryptoent://SD_ILS/0/SD_ILS:23221922025-09-07T04:42:42Z2025-09-07T04:42:42Zby Grimes, Roger A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119618195/?ar">https://learning.oreilly.com/library/view/~/9781119618195/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119618195">https://learning.oreilly.com/library/view/~/9781119618195</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119618195/?ar">https://go.oreilly.com/library-access/library/view/-/9781119618195/?ar</a><br/>Format: Electronic Resources<br/>Cryptography : the key to digital security, how it works, and why it mattersent://SD_ILS/0/SD_ILS:23246202025-09-07T04:42:42Z2025-09-07T04:42:42Zby Martin, Keith M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781684579136/?ar">https://go.oreilly.com/library-access/library/view/-/9781684579136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781684579136/?ar">https://learning.oreilly.com/library/view/~/9781684579136/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781684579136">https://learning.oreilly.com/library/view/~/9781684579136</a><br/>Format: Sound recording<br/>Providing Sound Foundations for Cryptography : On the Work of Shafi Goldwasser and Silvio Micali.ent://SD_ILS/0/SD_ILS:23591512025-09-07T04:42:42Z2025-09-07T04:42:42Zby Goldreich, Oded.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6954878">Click to View</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:20863752025-09-07T04:42:42Z2025-09-07T04:42:42Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Arithmetic, geometry, cryptography, and coding theory : international conference, November 5-9, 2007, CIRM, Marseilles, Franceent://SD_ILS/0/SD_ILS:22258832025-09-07T04:42:42Z2025-09-07T04:42:42Zby Lachaud, Gilles, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113150">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on cryptography with Python : leverage the power of Python to encrypt and decrypt dataent://SD_ILS/0/SD_ILS:23171012025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bowne, Sam, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789534443/?ar">https://go.oreilly.com/library-access/library/view/-/9781789534443/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789534443">https://learning.oreilly.com/library/view/~/9781789534443</a>
<a href="https://learning.oreilly.com/library/view/~/9781789534443/?ar">https://learning.oreilly.com/library/view/~/9781789534443/?ar</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126802025-09-07T04:42:42Z2025-09-07T04:42:42Zby Takagi, Tsuyoshi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232025-09-07T04:42:42Z2025-09-07T04:42:42Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5106442025-09-07T04:42:42Z2025-09-07T04:42:42Zby Smart, Nigel P. editor.<br/><a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036332025-09-07T04:42:42Z2025-09-07T04:42:42Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format: Electronic Resources<br/>Cryptography Algorithms : a Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryptionent://SD_ILS/0/SD_ILS:23315802025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bertaccini, Massimo.<br/><a href="https://learning.oreilly.com/library/view/~/9781789617139">https://learning.oreilly.com/library/view/~/9781789617139</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789617139/?ar">https://go.oreilly.com/library-access/library/view/-/9781789617139/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789617139/?ar">https://learning.oreilly.com/library/view/~/9781789617139/?ar</a><br/>Format: Electronic Resources<br/>Cryptography algorithms : a guide to algorithms in blockchain, quantum cryptography, zero-Knowledge protocols, and homomorphic encryptionent://SD_ILS/0/SD_ILS:23763992025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bertaccini, Massimo, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870913">Click to View</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322025-09-07T04:42:42Z2025-09-07T04:42:42Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5037532025-09-07T04:42:42Z2025-09-07T04:42:42Zby Buchmann, Johannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papersent://SD_ILS/0/SD_ILS:5112882025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ytrehus, Øyvind. editor.<br/><a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format: Electronic Resources<br/>Fault Diagnosis and Tolerance in Cryptography Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5117712025-09-07T04:42:42Z2025-09-07T04:42:42Zby Breveglieri, Luca. editor.<br/><a href="http://dx.doi.org/10.1007/11889700">http://dx.doi.org/10.1007/11889700</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5111992025-09-07T04:42:42Z2025-09-07T04:42:42Zby Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format: Electronic Resources<br/>Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarityent://SD_ILS/0/SD_ILS:5089292025-09-07T04:42:42Z2025-09-07T04:42:42Zby Schroeder, Manfred R. author.<br/><a href="http://dx.doi.org/10.1007/b137861">http://dx.doi.org/10.1007/b137861</a><br/>Format: Electronic Resources<br/>Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's dataent://SD_ILS/0/SD_ILS:23537232025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bock, Lisa, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6631539">Click to View</a><br/>Format: Electronic Resources<br/>Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Coreent://SD_ILS/0/SD_ILS:23186972025-09-07T04:42:42Z2025-09-07T04:42:42Zby Haunts, Stephen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243756/?ar">https://learning.oreilly.com/library/view/~/9781484243756/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484243756">https://learning.oreilly.com/library/view/~/9781484243756</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851072025-09-07T04:42:42Z2025-09-07T04:42:42Zby Lange, Tanja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232025-09-07T04:42:42Z2025-09-07T04:42:42Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852902025-09-07T04:42:42Z2025-09-07T04:42:42Zby Catalano, Dario. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382025-09-07T04:42:42Z2025-09-07T04:42:42Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632025-09-07T04:42:42Z2025-09-07T04:42:42Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125292025-09-07T04:42:42Z2025-09-07T04:42:42Zby Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036602025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ostrovsky, Rafail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85855-3">http://dx.doi.org/10.1007/978-3-540-85855-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033872025-09-07T04:42:42Z2025-09-07T04:42:42Zby Canetti, Ran. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5115862025-09-07T04:42:42Z2025-09-07T04:42:42Zby Prisco, Roberto. editor.<br/><a href="http://dx.doi.org/10.1007/11832072">http://dx.doi.org/10.1007/11832072</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097532025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kilian, Joe. editor.<br/><a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858542025-09-07T04:42:42Z2025-09-07T04:42:42Zby Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Algorithmic arithmetic, geometry, and coding theory : 14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, Franceent://SD_ILS/0/SD_ILS:22291272025-09-07T04:42:42Z2025-09-07T04:42:42Zby International Conference Arithmetic, Geometry, Cryptography and Coding Theory (14th : 2013 : Marseille, France)<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4832013">Click to View</a><br/>Format: Electronic Resources<br/>Demystifying Cryptography with OpenSSL 3.0 : Discover the Best Techniques to Enhance Your Network Security with OpenSSL 3. 0ent://SD_ILS/0/SD_ILS:23348322025-09-07T04:42:42Z2025-09-07T04:42:42Zby Khlebnikov, Alexei.<br/><a href="https://learning.oreilly.com/library/view/~/9781800560345">https://learning.oreilly.com/library/view/~/9781800560345</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781800560345/?ar">https://go.oreilly.com/library-access/library/view/-/9781800560345/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781800560345/?ar">https://learning.oreilly.com/library/view/~/9781800560345/?ar</a><br/>Format: Electronic Resources<br/>Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browserent://SD_ILS/0/SD_ILS:23741382025-09-07T04:42:42Z2025-09-07T04:42:42Zby Segala, Alessandro, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6870914">Click to View</a><br/>Format: Electronic Resources<br/>Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browserent://SD_ILS/0/SD_ILS:23315702025-09-07T04:42:42Z2025-09-07T04:42:42Zby Segala, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar">https://go.oreilly.com/library-access/library/view/-/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336/?ar">https://learning.oreilly.com/library/view/~/9781801075336/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801075336">https://learning.oreilly.com/library/view/~/9781801075336</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022025-09-07T04:42:42Z2025-09-07T04:42:42Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861432025-09-07T04:42:42Z2025-09-07T04:42:42Zby Carlet, Claude. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5127932025-09-07T04:42:42Z2025-09-07T04:42:42Zby Biham, Eli. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74462-7">http://dx.doi.org/10.1007/978-3-540-74462-7</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852532025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5107492025-09-07T04:42:42Z2025-09-07T04:42:42Zby Halevi, Shai. editor.<br/><a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5130322025-09-07T04:42:42Z2025-09-07T04:42:42Zby Adams, Carlisle. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77360-3">http://dx.doi.org/10.1007/978-3-540-77360-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5100202025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ioannidis, John. editor.<br/><a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papersent://SD_ILS/0/SD_ILS:5097432025-09-07T04:42:42Z2025-09-07T04:42:42Zby Handschuh, Helena. editor.<br/><a href="http://dx.doi.org/10.1007/b105103">http://dx.doi.org/10.1007/b105103</a><br/>Format: Electronic Resources<br/>Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10ent://SD_ILS/0/SD_ILS:23326172025-09-07T04:42:42Z2025-09-07T04:42:42Zby Nita, Stefania Loredana, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484281055/?ar">https://learning.oreilly.com/library/view/~/9781484281055/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar">https://go.oreilly.com/library-access/library/view/-/9781484281055/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484281055">https://learning.oreilly.com/library/view/~/9781484281055</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5122482025-09-07T04:42:42Z2025-09-07T04:42:42Zby Vadhan, Salil P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853902025-09-07T04:42:42Z2025-09-07T04:42:42Zby Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Recent trends in cryptography : UIMP-RSME Santaló Summer School, July 11-15, 2005, Universidad Internacional Menéndez Pelayo, Santander, Spainent://SD_ILS/0/SD_ILS:22258902025-09-07T04:42:42Z2025-09-07T04:42:42Zby UIMP-RSME Santaló Summer School (2005 : Universidad Internadional Menéndez Pelayo), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113157">Click to View</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860642025-09-07T04:42:42Z2025-09-07T04:42:42Zby Adams, Carlisle. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858012025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856772025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859722025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5036102025-09-07T04:42:42Z2025-09-07T04:42:42Zby Tsudik, Gene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papersent://SD_ILS/0/SD_ILS:5108432025-09-07T04:42:42Z2025-09-07T04:42:42Zby Preneel, Bart. editor.<br/><a href="http://dx.doi.org/10.1007/11693383">http://dx.doi.org/10.1007/11693383</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5026912025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bellovin, Steven M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Group theory, statistics, and cryptography : AMS Special Session, Combinatorial and Statistical Group Theory, April 12-13, 2003, New York Universityent://SD_ILS/0/SD_ILS:22260142025-09-07T04:42:42Z2025-09-07T04:42:42Zby AMS Special Session Combinatorial and Statistical Group Theory (2003 : New York University), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113281">Click to View</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857782025-09-07T04:42:42Z2025-09-07T04:42:42Zby Güneysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy : 2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:23586952025-09-07T04:42:42Z2025-09-07T04:42:42Zby Avoine, Gildas, editor.<br/>Format: Books<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859372025-09-07T04:42:42Z2025-09-07T04:42:42Zby Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:5038032025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kawano, Yasuhito. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862025-09-07T04:42:42Z2025-09-07T04:42:42Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papersent://SD_ILS/0/SD_ILS:5117732025-09-07T04:42:42Z2025-09-07T04:42:42Zby Crescenzo, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/11889663">http://dx.doi.org/10.1007/11889663</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 – March 3, 2005. Revised Papersent://SD_ILS/0/SD_ILS:5101322025-09-07T04:42:42Z2025-09-07T04:42:42Zby Patrick, Andrew S. editor.<br/><a href="http://dx.doi.org/10.1007/b137875">http://dx.doi.org/10.1007/b137875</a><br/>Format: Electronic Resources<br/>Arithmetic, geometry, cryptography, and coding theory : 15th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory, May 18-22, 2015, CIRM, Marseille, Franceent://SD_ILS/0/SD_ILS:22295792025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bassa, Alp, 1982- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4908299">Click to View</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5033722025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cramer, Ronald. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format: Electronic Resources<br/>Public Key Cryptography – PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5123812025-09-07T04:42:42Z2025-09-07T04:42:42Zby Okamoto, Tatsuaki. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-71677-8">http://dx.doi.org/10.1007/978-3-540-71677-8</a><br/>Format: Electronic Resources<br/>Arithmetic, geometry, cryptography and coding theory : 13th Conference on Arithmetic, Geometry, Cryptography and Coding Theory, March 14-18, 2011, CIRM, Marseille, France : Geocrypt 2011, June 19-24, 2011, Bastia, Franceent://SD_ILS/0/SD_ILS:22260182025-09-07T04:42:42Z2025-09-07T04:42:42Zby International Conference Arithmetic, Geometry, Cryptography and Coding Theory (13th : 2011 : Marseille, France), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113285">Click to View</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2005 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedingsent://SD_ILS/0/SD_ILS:5097572025-09-07T04:42:42Z2025-09-07T04:42:42Zby Vaudenay, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/b105124">http://dx.doi.org/10.1007/b105124</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography and Computational Number Theory : Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000.ent://SD_ILS/0/SD_ILS:12988962025-09-07T04:42:42Z2025-09-07T04:42:42Zby Alster, Kazimierz.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3042141">Click to View</a><br/>Format: Electronic Resources<br/>Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedingsent://SD_ILS/0/SD_ILS:5110072025-09-07T04:42:42Z2025-09-07T04:42:42Zby Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/11745853">http://dx.doi.org/10.1007/11745853</a><br/>Format: Electronic Resources<br/>Arithmetic geometry : computation and applications : 16th International Conference on Arithmetic, Geometry, Cryptography, and Coding Theory, June 19-23, 2017, Centre International de Rencontres Mathematiques, Marseille, Franceent://SD_ILS/0/SD_ILS:22315632025-09-07T04:42:42Z2025-09-07T04:42:42Zby Aubry, Yves, 1965- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5633661">Click to View</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859832025-09-07T04:42:42Z2025-09-07T04:42:42Zby Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858442025-09-07T04:42:42Z2025-09-07T04:42:42Zby Abdalla, Michel. editor. (orcid)0000-0002-2447-4329<br/><a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papersent://SD_ILS/0/SD_ILS:5130332025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77366-5">http://dx.doi.org/10.1007/978-3-540-77366-5</a><br/>Format: Electronic Resources<br/>Algebraic methods in cryptography : Special Session on Algebraic Cryptography at the Joint International Meeting of the AMS and the Deutsche Mathematiker-Vereinigung, June 16-19, 2005, Mainz, Germany : International Workshop on Algebraic Methods in Cryptography, November 17-19, 2005, Bochum, Germanyent://SD_ILS/0/SD_ILS:22261172025-09-07T04:42:42Z2025-09-07T04:42:42Zby Special Session on Algebraic Cryptography at the Joint International Meeting of the AMS and the Deutsche Mathematiker-Vereinigung (2005 : Mainz, Germany), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113384">Click to View</a><br/>Format: Electronic Resources<br/>Error-correcting codes, finite geometries, and cryptography : Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session, Error Control Codes, Information Theory and Applied Cryptography, CMS Winter Meeting, Dec 8-10, 2007, London, Ontario, Canadaent://SD_ILS/0/SD_ILS:22261232025-09-07T04:42:42Z2025-09-07T04:42:42Zby Conference on Error-control Codes, Information Theory, and Applied Cryptography (2007 : Toronto, Ont.), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113390">Click to View</a><br/>Format: Electronic Resources<br/>Arithmetic, geometry, cryptography, and coding theory 2009 : 12th Conference on Arithmetic, Geometry, Cryptography, and Coding Theory, March 30-April 3, 2009, Marseille, France : Geocrypt Conference, April 27-May 1, 2009, Pointe-à-Pitre, Guadeloupe, France : European Science Foundation Exploratory Workshop, Curves, Coding Theory, and Cryptography, March 25-29, 2009, Marseille, Franceent://SD_ILS/0/SD_ILS:22260822025-09-07T04:42:42Z2025-09-07T04:42:42Zby International Conference Arithmetic, Geometry, Cryptography and Coding Theory (12th : 2009 : Marseille, France), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113349">Click to View</a><br/>Format: Electronic Resources<br/>Computational and combinatorial group theory and cryptography : AMS Special Sessions : Computational Algebra, Groups, and Applications, April 30-May 1, 2011, University of Nevada, Las Vegas, Nevada, NV : Mathematical Aspects of Cryptography and Cyber Security, September 10-11, 2011, Cornell University, Ithaca, New Yorkent://SD_ILS/0/SD_ILS:22261582025-09-07T04:42:42Z2025-09-07T04:42:42Zby Fine, Benjamin, 1948- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113425">Click to View</a><br/>Format: Electronic Resources<br/>Algebra and computer science : Joint AMS-EMS-SPM Meeting Algebra and Computer Science June 10-13, 2015: Porto, Portugal : Joint Mathematics Meetings Groups, Algorithms, and Cryptography January 10-13, 2015: San Antonio, TX : Joint AMS-Israel Mathematical Union Meeting Applications of Algebra to Cryptography June 16-19, 2014: Tel-Aviv, Israelent://SD_ILS/0/SD_ILS:22295152025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kahrobaei, Delaram, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4901796">Click to View</a><br/>Format: Electronic Resources<br/>Secure Data Deletionent://SD_ILS/0/SD_ILS:20847492025-09-07T04:42:42Z2025-09-07T04:42:42Zby Reardon, Joel. author.<br/><a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Modelling and Verification of Secure Examsent://SD_ILS/0/SD_ILS:20846812025-09-07T04:42:42Z2025-09-07T04:42:42Zby Giustolisi, Rosario. author.<br/><a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format: Electronic Resources<br/>Formal Correctness of Security Protocols With 62 Figures and 4 Tablesent://SD_ILS/0/SD_ILS:5120522025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format: Electronic Resources<br/>Concurrent Zero-Knowledge With Additional Background by Oded Goldreichent://SD_ILS/0/SD_ILS:5107942025-09-07T04:42:42Z2025-09-07T04:42:42Zby Rosen, Alon. author.<br/><a href="http://dx.doi.org/10.1007/3-540-32939-0">http://dx.doi.org/10.1007/3-540-32939-0</a><br/>Format: Electronic Resources<br/>Access control, security, and trust : a logical approachent://SD_ILS/0/SD_ILS:21317372025-09-07T04:42:42Z2025-09-07T04:42:42Zby Chin, Shiu-Kai, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1648320">Click to View</a><br/>Format: Electronic Resources<br/>Handbook on soft computing for video surveillanceent://SD_ILS/0/SD_ILS:22937372025-09-07T04:42:42Z2025-09-07T04:42:42Zby Pal, Sankar K.<br/><a href="https://learning.oreilly.com/library/view/~/9781439856857">https://learning.oreilly.com/library/view/~/9781439856857</a>
<a href="https://learning.oreilly.com/library/view/~/9781439856857/?ar">https://learning.oreilly.com/library/view/~/9781439856857/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439856857/?ar">https://go.oreilly.com/library-access/library/view/-/9781439856857/?ar</a><br/>Format: Electronic Resources<br/>Handbook on soft computing for video surveillanceent://SD_ILS/0/SD_ILS:21266312025-09-07T04:42:42Z2025-09-07T04:42:42Zby Pal, Sankar K.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=870695">Click to View</a><br/>Format: Electronic Resources<br/>Visualization and verbalization of dataent://SD_ILS/0/SD_ILS:22702612025-09-07T04:42:42Z2025-09-07T04:42:42Zby Blasius, Jörg, 1957- editor of compilation.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1414098">Click to View</a><br/>Format: Electronic Resources<br/>Communication system securityent://SD_ILS/0/SD_ILS:21316412025-09-07T04:42:42Z2025-09-07T04:42:42Zby Chen, Lidong, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1575384">Click to View</a><br/>Format: Electronic Resources<br/>Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction.ent://SD_ILS/0/SD_ILS:23371012025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kheyfits, Alexander I.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6741210">Click to View</a><br/>Format: Electronic Resources<br/>Şifreler kitabı: işaretler, semboller, kodlar, gizli dillerent://SD_ILS/0/SD_ILS:4302362025-09-07T04:42:42Z2025-09-07T04:42:42Zby Lunde, Paul, 1943- editor.<br/>Format: Books<br/>Şifrelerin matematiği : kriptografient://SD_ILS/0/SD_ILS:738602025-09-07T04:42:42Z2025-09-07T04:42:42Zby Çimen, Canan.<br/>Format: Books<br/>Kryptografie : verfahren, protokolle, infrastrukturenent://SD_ILS/0/SD_ILS:23103482025-09-07T04:42:42Z2025-09-07T04:42:42Zby Schmeh, Klaus, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457199783/?ar">https://go.oreilly.com/library-access/library/view/-/9781457199783/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457199783/?ar">https://learning.oreilly.com/library/view/~/9781457199783/?ar</a><br/>Format: Electronic Resources<br/>Kryptografie : verfahren, protokolle, infrastrukturenent://SD_ILS/0/SD_ILS:22995002025-09-07T04:42:42Z2025-09-07T04:42:42Zby Schmeh, Klaus.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457182716/?ar">https://go.oreilly.com/library-access/library/view/-/9781457182716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457182716/?ar">https://learning.oreilly.com/library/view/~/9781457182716/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781457199783">https://learning.oreilly.com/library/view/~/9781457199783</a><br/>Format: Electronic Resources<br/>Cracking codes & cryptograms for dummiesent://SD_ILS/0/SD_ILS:22884652025-09-07T04:42:42Z2025-09-07T04:42:42Zby Sutherland, Denise.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470591000/?ar">https://go.oreilly.com/library-access/library/view/-/9780470591000/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470591000/?ar">https://learning.oreilly.com/library/view/~/9780470591000/?ar</a><br/>Format: Electronic Resources<br/>Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Libraryent://SD_ILS/0/SD_ILS:634182025-09-07T04:42:42Z2025-09-07T04:42:42Zby Uslu, Sevgi.<br/><a href="http://hdl.handle.net/11147/3836">Access to Electronic Version.</a><br/>Format: Manuscript<br/>A distributed multiprecision cryptographic library designent://SD_ILS/0/SD_ILS:165652025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hışıl, Hüseyin.<br/><a href="http://hdl.handle.net/11147/3226">Access to Electronic Version.</a><br/>Format: Manuscript<br/>The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystemsent://SD_ILS/0/SD_ILS:633602025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mersin, Ali.<br/><a href="http://hdl.handle.net/11147/3830">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Issues in Online Security : Issues in Online Security.ent://SD_ILS/0/SD_ILS:11965902025-09-07T04:42:42Z2025-09-07T04:42:42Zby Gorman, Gary.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=328763">Click to View</a><br/>Format: Electronic Resources<br/>A genetic algorithmic approach to the differential and linear cryptanalysisent://SD_ILS/0/SD_ILS:875682025-09-07T04:42:42Z2025-09-07T04:42:42Zby Eminağaoğlu, Mete.<br/><a href="http://hdl.handle.net/11147/3968">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:21730702025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dirk Beyer<br/><a href="https://link.springer.com/book/10.1007/978-3-319-89960-2">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/60989">DOAB: description of the publication</a><br/>Format: Books<br/>Codes and Ciphers : Julius Caesar, the Enigma, and the Internet.ent://SD_ILS/0/SD_ILS:11815732025-09-07T04:42:42Z2025-09-07T04:42:42Zby Churchhouse, R. F.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=202096">Click to View</a><br/>Format: Electronic Resources<br/>Versteckte Botschaften : die faszinierende Geschichte der Steganografieent://SD_ILS/0/SD_ILS:23146762025-09-07T04:42:42Z2025-09-07T04:42:42Zby Schmeh, Klaus, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492064855">https://learning.oreilly.com/library/view/~/9781492064855</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar">https://go.oreilly.com/library-access/library/view/-/9781492064855/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492064855/?ar">https://learning.oreilly.com/library/view/~/9781492064855/?ar</a><br/>Format: Electronic Resources<br/>American cryptology : two centuries of traditionent://SD_ILS/0/SD_ILS:22908902025-09-07T04:42:42Z2025-09-07T04:42:42Zby United States. National Security Agency.<br/><a href="https://learning.oreilly.com/library/view/~/01120100038SI">https://learning.oreilly.com/library/view/~/01120100038SI</a>
<a href="https://learning.oreilly.com/library/view/~/01120100038SI/?ar">https://learning.oreilly.com/library/view/~/01120100038SI/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/01120100038SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100038SI/?ar</a><br/>Format: Electronic Resources<br/>Code breakers : inside the shadow world of signals intelligence in Australia's two Bletchley Parksent://SD_ILS/0/SD_ILS:21441162025-09-07T04:42:42Z2025-09-07T04:42:42Zby Collie, Craig, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4826585">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographic agility and interoperability : proceedings of a workshopent://SD_ILS/0/SD_ILS:22297312025-09-07T04:42:42Z2025-09-07T04:42:42Zby Johnson, Anne Frances, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4987115">Click to View</a><br/>Format: Electronic Resources<br/>Encyclopedia of cryptologyent://SD_ILS/0/SD_ILS:2568832025-09-07T04:42:42Z2025-09-07T04:42:42Zby Newton, David E.<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1475">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1475</a><br/>Format: Electronic Resources<br/>Journal of cryptology : the journal of the International Association for Cryptologic Research.ent://SD_ILS/0/SD_ILS:2298802025-09-07T04:42:42Z2025-09-07T04:42:42Zby International Association for Cryptologic Research.<br/>Format: Continuing Resources<br/>Cryptologia.ent://SD_ILS/0/SD_ILS:2297932025-09-07T04:42:42Z2025-09-07T04:42:42Zby Albion College. Dept. of Mathematics.<br/>Format: Continuing Resources<br/>Advances on Superelliptic Curves and Their Applications.ent://SD_ILS/0/SD_ILS:13365072025-09-07T04:42:42Z2025-09-07T04:42:42Zby Beshaj, L.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3563926">Click to View</a><br/>Format: Electronic Resources<br/>Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystemsent://SD_ILS/0/SD_ILS:578512025-09-07T04:42:42Z2025-09-07T04:42:42Zby Beyazıt, Mutlu.<br/><a href="http://hdl.handle.net/11147/3802">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Defining a sample template for governmental procurements of cryptographic productsent://SD_ILS/0/SD_ILS:169352025-09-07T04:42:42Z2025-09-07T04:42:42Zby Taş, Levent.<br/><a href="http://hdl.handle.net/11147/3340">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Privacy-Preserving rare disease analysis with fully homomorphic encryptionent://SD_ILS/0/SD_ILS:23425872025-09-07T04:42:42Z2025-09-07T04:42:42Zby Akkaya, Güliz, author.<br/><a href="https://hdl.handle.net/11147/13937">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Quantum Communication and Security.ent://SD_ILS/0/SD_ILS:11959452025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kilin, S.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=320309">Click to View</a><br/>Format: Electronic Resources<br/>Masked dispatches : cryptograms and cryptology in American history, 1775-1900ent://SD_ILS/0/SD_ILS:23046462025-09-07T04:42:42Z2025-09-07T04:42:42Zby Weber, Ralph E. (Ralph Edward), 1926- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100005SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100005SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100005SI/?ar">https://learning.oreilly.com/library/view/~/01120100005SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100005SI">https://learning.oreilly.com/library/view/~/01120100005SI</a><br/>Format: Electronic Resources<br/>The history of information security a comprehensive handbookent://SD_ILS/0/SD_ILS:641982025-09-07T04:42:42Z2025-09-07T04:42:42Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Sharing the burden : women in cryptology during World War IIent://SD_ILS/0/SD_ILS:23046472025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wilcox, Jennifer E., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100014SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100014SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100014SI">https://learning.oreilly.com/library/view/~/01120100014SI</a>
<a href="https://learning.oreilly.com/library/view/~/01120100014SI/?ar">https://learning.oreilly.com/library/view/~/01120100014SI/?ar</a><br/>Format: Electronic Resources<br/>Secret messages : codebreaking and American diplomacy, 1930-1945ent://SD_ILS/0/SD_ILS:23749762025-09-07T04:42:42Z2025-09-07T04:42:42Zby Alvarez, David J., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5343520">Click to View</a><br/>Format: Electronic Resources<br/>Rare books in the National Cryptologic Museum.ent://SD_ILS/0/SD_ILS:23101852025-09-07T04:42:42Z2025-09-07T04:42:42Zby United States. National Security Agency/Central Security Service. Center for Cryptologic History.<br/><a href="https://learning.oreilly.com/library/view/~/01120100043SI/?ar">https://learning.oreilly.com/library/view/~/01120100043SI/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/01120100043SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100043SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100043SI">https://learning.oreilly.com/library/view/~/01120100043SI</a><br/>Format: Electronic Resources<br/>Codebreakers' Victory : How the Allied Cryptographers Won World War II.ent://SD_ILS/0/SD_ILS:20901452025-09-07T04:42:42Z2025-09-07T04:42:42Zby Haufler, Hervie.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1806109">Click to View</a><br/>Format: Electronic Resources<br/>Cryptanalysis of number theretic ciphersent://SD_ILS/0/SD_ILS:119832025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wagstaff, Samuel S.<br/>Format: Books<br/>Quantum computing : progress and prospectsent://SD_ILS/0/SD_ILS:22320392025-09-07T04:42:42Z2025-09-07T04:42:42Zby Grumbling, Emily, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5742474">Click to View</a><br/>Format: Electronic Resources<br/>Cryptologic aspects of German intelligence activities in South America during World War IIent://SD_ILS/0/SD_ILS:22919542025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mowry, David P., author.<br/><a href="https://learning.oreilly.com/library/view/~/01120100040SI">https://learning.oreilly.com/library/view/~/01120100040SI</a>
<a href="https://go.oreilly.com/library-access/library/view/-/01120100040SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100040SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100040SI/?ar">https://learning.oreilly.com/library/view/~/01120100040SI/?ar</a><br/>Format: Electronic Resources<br/>Modelling of Turkey Turkish words by Discretemarkov processesent://SD_ILS/0/SD_ILS:78622025-09-07T04:42:42Z2025-09-07T04:42:42Zby Güventürk, Jale.<br/><a href="http://hdl.handle.net/11147/3872">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Secure Multi-Party Computation.ent://SD_ILS/0/SD_ILS:12555682025-09-07T04:42:42Z2025-09-07T04:42:42Zby Prabhakaran, M.M.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1137458">Click to View</a><br/>Format: Electronic Resources<br/>Advanced Linear Cryptanalysis of Block and Stream Ciphers.ent://SD_ILS/0/SD_ILS:12377262025-09-07T04:42:42Z2025-09-07T04:42:42Zby Junod, P.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=836210">Click to View</a><br/>Format: Electronic Resources<br/>B92 based quantum key distribution with faint pulsed laserent://SD_ILS/0/SD_ILS:22605722025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mutlu, Görkem, author.<br/><a href="https://hdl.handle.net/11147/12024">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Eavesdropping on hell : historical guide to Western communications intelligence and the Holocaust, 1939-1945ent://SD_ILS/0/SD_ILS:22825562025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hanyok, Robert J.<br/><a href="https://learning.oreilly.com/library/view/~/01120090002SI">https://learning.oreilly.com/library/view/~/01120090002SI</a>
<a href="https://go.oreilly.com/library-access/library/view/-/01120090002SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120090002SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120090002SI/?ar">https://learning.oreilly.com/library/view/~/01120090002SI/?ar</a><br/>Format: Electronic Resources<br/>American signal intelligence in Northwest Africa and Western Europeent://SD_ILS/0/SD_ILS:22900332025-09-07T04:42:42Z2025-09-07T04:42:42Zby Howe, George F. (George Frederick), 1901-1988.<br/><a href="https://go.oreilly.com/library-access/library/view/-/01120100011SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100011SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100011SI/?ar">https://learning.oreilly.com/library/view/~/01120100011SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100011SI">https://learning.oreilly.com/library/view/~/01120100011SI</a><br/>Format: Electronic Resources<br/>The quest for cryptologic centralization and the establishment of NSA : 1940-1952ent://SD_ILS/0/SD_ILS:22896002025-09-07T04:42:42Z2025-09-07T04:42:42Zby Burns, Thomas L.<br/><a href="https://learning.oreilly.com/library/view/~/01120100006SI/?ar">https://learning.oreilly.com/library/view/~/01120100006SI/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/01120100006SI/?ar">https://go.oreilly.com/library-access/library/view/-/01120100006SI/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/01120100006SI">https://learning.oreilly.com/library/view/~/01120100006SI</a><br/>Format: Electronic Resources<br/>Understanding cryptocurrencies : the money of the futureent://SD_ILS/0/SD_ILS:21566562025-09-07T04:42:42Z2025-09-07T04:42:42Zby Matharu, Arvind, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5604915">Click to View</a><br/>Format: Electronic Resources<br/>Elementary Cryptanalysis.ent://SD_ILS/0/SD_ILS:13142072025-09-07T04:42:42Z2025-09-07T04:42:42Zby Sinkov, Abraham.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3330402">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:22120722025-09-07T04:42:42Z2025-09-07T04:42:42Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4835216">Click to View</a><br/>Format: Electronic Resources<br/>Hands-on bitcoin programming with Python : build powerful online payment centric applications with Pythonent://SD_ILS/0/SD_ILS:22150852025-09-07T04:42:42Z2025-09-07T04:42:42Zby Garg, Harish Kumar, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5504928">Click to View</a><br/>Format: Electronic Resources<br/>Morse code Wrens of Station X : Bletchley's outer circleent://SD_ILS/0/SD_ILS:20632632025-09-07T04:42:42Z2025-09-07T04:42:42Zby Glyn-Jones, Anne, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4879160">Click to View</a><br/>Format: Electronic Resources<br/>Siber güvenlik ve savunma : farkındalık ve caydırıcılıkent://SD_ILS/0/SD_ILS:22610412025-09-07T04:42:42Z2025-09-07T04:42:42Zby Sağıroğlu, Şeref, editor author.<br/>Format: Books<br/>Siber güvenlik ve savunma : problemler ve çözümlerent://SD_ILS/0/SD_ILS:22610432025-09-07T04:42:42Z2025-09-07T04:42:42Zby Sağıroğlu, Şeref, editor. author.<br/>Format: Books<br/>Secret cables of the Comintern, 1933-1943ent://SD_ILS/0/SD_ILS:22712592025-09-07T04:42:42Z2025-09-07T04:42:42Zby Firsov, Fridrikh Igorevich, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3421435">Click to View</a><br/>Format: Electronic Resources<br/>Breaking Japanese diplomatic codes : David Sissons and D Special Section during the Second World Warent://SD_ILS/0/SD_ILS:20989202025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ball, Desmond, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4585027">Click to View</a><br/>Format: Electronic Resources<br/>An analysis of key generation efficiency of rsa cryptos ystem in distributed environmentsent://SD_ILS/0/SD_ILS:169342025-09-07T04:42:42Z2025-09-07T04:42:42Zby Çağrıcı, Gökhan.<br/><a href="http://hdl.handle.net/11147/3339">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Mercury : The Secret and Swift Messenger: Showing How a Man with Privacy and Speed May Communicate His Thoughts to a Friend at Any Distance (1707).ent://SD_ILS/0/SD_ILS:12908502025-09-07T04:42:42Z2025-09-07T04:42:42Zby Wilkins, John.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3016015">Click to View</a><br/>Format: Electronic Resources<br/>Cours d'algèbre et d'algorithmique : applications à la cryptologie du RSA et du logarithme discretent://SD_ILS/0/SD_ILS:21236782025-09-07T04:42:42Z2025-09-07T04:42:42Zby Meunier, Pierre, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709822">Click to View</a><br/>Format: Electronic Resources<br/>Algebraic Geometry Modeling in Information Theory.ent://SD_ILS/0/SD_ILS:12559282025-09-07T04:42:42Z2025-09-07T04:42:42Zby Martinez-Moro, Edgar.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1143318">Click to View</a><br/>Format: Electronic Resources<br/>Development of long distance free-space quantum key distribution systement://SD_ILS/0/SD_ILS:23785802025-09-07T04:42:42Z2025-09-07T04:42:42Zby Tapşın, Ömer Salih, author.<br/><a href="https://hdl.handle.net/11147/15148">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Secret duties of a signals interceptor : working with Bletchley Park, the SDS and the OSS, or, a long time to hopeent://SD_ILS/0/SD_ILS:20621182025-09-07T04:42:42Z2025-09-07T04:42:42Zby Nater, Jenny, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4799722">Click to View</a><br/>Format: Electronic Resources<br/>Mathematical recreations & essaysent://SD_ILS/0/SD_ILS:20932842025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4669422">Click to View</a><br/>Format: Electronic Resources<br/>Finite fields and applications : Eighth International Conference on Finite Fields and Applications, July 9-13, 2007, Melbourne, Australiaent://SD_ILS/0/SD_ILS:22259982025-09-07T04:42:42Z2025-09-07T04:42:42Zby International Conference on Finite Fields and Applications (8th : 2007 : Melbourne, Australia), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113265">Click to View</a><br/>Format: Electronic Resources<br/>Secret Language : Codes, Tricks, Spies, Thieves, and Witchcraft.ent://SD_ILS/0/SD_ILS:12133402025-09-07T04:42:42Z2025-09-07T04:42:42Zby Blake, Barry J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=497604">Click to View</a><br/>Format: Electronic Resources<br/>zSeries Crypto Guide Update.ent://SD_ILS/0/SD_ILS:13100962025-09-07T04:42:42Z2025-09-07T04:42:42Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306705">Click to View</a><br/>Format: Electronic Resources<br/>Real Life Cryptologyent://SD_ILS/0/SD_ILS:22038772025-09-07T04:42:42Z2025-09-07T04:42:42Zby Lang, Benedek<br/><a href="https://library.oapen.org/bitstream/20.500.12657/28452/1/1001507.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/35937">DOAB: description of the publication</a><br/>Format: Books<br/>Internet and intranet security management risks and solutionsent://SD_ILS/0/SD_ILS:22616702025-09-07T04:42:42Z2025-09-07T04:42:42Zby Janczewski, Lech, 1943-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-87828-971-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-87828-971-1</a><br/>Format: Electronic Resources<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:22846272025-09-07T04:42:42Z2025-09-07T04:42:42Zby Swenson, Christopher, 1983-<br/><a href="https://learning.oreilly.com/library/view/~/9780470135938">https://learning.oreilly.com/library/view/~/9780470135938</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar">https://go.oreilly.com/library-access/library/view/-/9780470135938/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470135938/?ar">https://learning.oreilly.com/library/view/~/9780470135938/?ar</a><br/>Format: Electronic Resources<br/>zSeries Trusted Key Entry (TKE) V4.2 Update.ent://SD_ILS/0/SD_ILS:13100672025-09-07T04:42:42Z2025-09-07T04:42:42Zby Redbooks, IBM.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3306676">Click to View</a><br/>Format: Electronic Resources<br/>Boolean Functions in Cryptology and Information Security.ent://SD_ILS/0/SD_ILS:11992902025-09-07T04:42:42Z2025-09-07T04:42:42Zby Preneel, B.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=363218">Click to View</a><br/>Format: Electronic Resources<br/>Advanced Technologies of Quantum Key Distributionent://SD_ILS/0/SD_ILS:21785252025-09-07T04:42:42Z2025-09-07T04:42:42Zby Sergiy Gnatyuk<br/><a href="https://www.intechopen.com/books/advanced-technologies-of-quantum-key-distribution">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/40216">DOAB: description of the publication</a><br/>Format: Books<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:23109662025-09-07T04:42:42Z2025-09-07T04:42:42Zby Shavers, Brett, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033524/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033524/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033524/?ar">https://learning.oreilly.com/library/view/~/9780128033524/?ar</a><br/>Format: Electronic Resources<br/>Partition-Based Trapdoor Ciphersent://SD_ILS/0/SD_ILS:21687932025-09-07T04:42:42Z2025-09-07T04:42:42Zby Arnaud Bannier<br/><a href="https://www.intechopen.com/books/partition-based-trapdoor-ciphers">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/55737">DOAB: description of the publication</a><br/>Format: Books<br/>Blockchain and Cryptocurrenciesent://SD_ILS/0/SD_ILS:21800522025-09-07T04:42:42Z2025-09-07T04:42:42Zby Asma Salman<br/><a href="https://www.intechopen.com/books/blockchain-and-cryptocurrencies">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/42327">DOAB: description of the publication</a><br/>Format: Books<br/>Cryptoent://SD_ILS/0/SD_ILS:23313232025-09-07T04:42:42Z2025-09-07T04:42:42Zby Levy, Steven, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar">https://go.oreilly.com/library-access/library/view/-/9781666117615/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615">https://learning.oreilly.com/library/view/~/9781666117615</a>
<a href="https://learning.oreilly.com/library/view/~/9781666117615/?ar">https://learning.oreilly.com/library/view/~/9781666117615/?ar</a><br/>Format: Electronic Resources<br/>Code breakers and spies of the Cold Warent://SD_ILS/0/SD_ILS:22680822025-09-07T04:42:42Z2025-09-07T04:42:42Zby Hurt, Avery Elizabeth, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5733936">Click to View</a><br/>Format: Electronic Resources<br/>The Digital Big Bang : the Hard Stuff, the Soft Stuff, and the Future of Cybersecurityent://SD_ILS/0/SD_ILS:23215742025-09-07T04:42:42Z2025-09-07T04:42:42Zby Quade, Phil.<br/><a href="https://learning.oreilly.com/library/view/~/9781119617365">https://learning.oreilly.com/library/view/~/9781119617365</a>
<a href="https://learning.oreilly.com/library/view/~/9781119617365/?ar">https://learning.oreilly.com/library/view/~/9781119617365/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar">https://go.oreilly.com/library-access/library/view/-/9781119617365/?ar</a><br/>Format: Electronic Resources<br/>Introduction to Identity-Based Encryption.ent://SD_ILS/0/SD_ILS:11975632025-09-07T04:42:42Z2025-09-07T04:42:42Zby Martin, Luther.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=338784">Click to View</a><br/>Format: Electronic Resources<br/>Coding and Cryptology : Proceedings of the First International Workshop.ent://SD_ILS/0/SD_ILS:12583472025-09-07T04:42:42Z2025-09-07T04:42:42Zby Li, Yongqing.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1193245">Click to View</a><br/>Format: Electronic Resources<br/>Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurityent://SD_ILS/0/SD_ILS:23214482025-09-07T04:42:42Z2025-09-07T04:42:42Zby Carey, Marcus J. (Cybersecurity professional), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119643326">https://learning.oreilly.com/library/view/~/9781119643326</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643326/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643326/?ar">https://learning.oreilly.com/library/view/~/9781119643326/?ar</a><br/>Format: Electronic Resources<br/>Intelligent Watermarking Techniques : Series On Innovative Intelligence.ent://SD_ILS/0/SD_ILS:11836292025-09-07T04:42:42Z2025-09-07T04:42:42Zby Pan, Jeng-Shyang.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=231561">Click to View</a><br/>Format: Electronic Resources<br/>Coding theory and quantum computing : an International Conference on Coding Theory and Quantum Computing, May 20-24, 2003, University of Virginiaent://SD_ILS/0/SD_ILS:22259112025-09-07T04:42:42Z2025-09-07T04:42:42Zby International Conference on Coding Theory and Quantum Computing (2003 : University of Virginia), issuing body.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3113178">Click to View</a><br/>Format: Electronic Resources<br/>User's Guide tp Crytography and Standards.ent://SD_ILS/0/SD_ILS:11833672025-09-07T04:42:42Z2025-09-07T04:42:42Zby Dent, Alex.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=227658">Click to View</a><br/>Format: Electronic Resources<br/>Applied Public Key Infrastructure : 4th International Workshop: IWAP 2005.ent://SD_ILS/0/SD_ILS:11867952025-09-07T04:42:42Z2025-09-07T04:42:42Zby Zhou, J.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=265956">Click to View</a><br/>Format: Electronic Resources<br/>Modelling Cyber Security : Approaches, Methodology, Strategies.ent://SD_ILS/0/SD_ILS:12134852025-09-07T04:42:42Z2025-09-07T04:42:42Zby Gori, U.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=501456">Click to View</a><br/>Format: Electronic Resources<br/>The broken seal : 'Operation Magic' and the secret road to Pearl Harbor'ent://SD_ILS/0/SD_ILS:22744312025-09-07T04:42:42Z2025-09-07T04:42:42Zby Fargo, Ladislas, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6176465">Click to View</a><br/>Format: Electronic Resources<br/>Alice and Bob learn application security.ent://SD_ILS/0/SD_ILS:23259582025-09-07T04:42:42Z2025-09-07T04:42:42Zby Janca, Tanya.<br/><a href="https://learning.oreilly.com/library/view/~/9781119687351">https://learning.oreilly.com/library/view/~/9781119687351</a>
<a href="https://learning.oreilly.com/library/view/~/9781119687351/?ar">https://learning.oreilly.com/library/view/~/9781119687351/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar">https://go.oreilly.com/library-access/library/view/-/9781119687351/?ar</a><br/>Format: Electronic Resources<br/>The Reader of Gentlemen’s Mail : Herbert O. Yardley and American Intelligence.ent://SD_ILS/0/SD_ILS:13309682025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kahn, David.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3420152">Click to View</a><br/>Format: Electronic Resources<br/>Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurityent://SD_ILS/0/SD_ILS:23254512025-09-07T04:42:42Z2025-09-07T04:42:42Zby Carey, Marcus J. (Cybersecurity professional)<br/><a href="https://learning.oreilly.com/library/view/~/9781119643418">https://learning.oreilly.com/library/view/~/9781119643418</a>
<a href="https://learning.oreilly.com/library/view/~/9781119643418/?ar">https://learning.oreilly.com/library/view/~/9781119643418/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar">https://go.oreilly.com/library-access/library/view/-/9781119643418/?ar</a><br/>Format: Electronic Resources<br/>Hashing in Computer Science : Fifty Years of Slicing and Dicing.ent://SD_ILS/0/SD_ILS:12156732025-09-07T04:42:42Z2025-09-07T04:42:42Zby Konheim, Alan G.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:22893602025-09-07T04:42:42Z2025-09-07T04:42:42Zby Konheim, Alan G., 1934-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar">https://go.oreilly.com/library-access/library/view/-/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834/?ar">https://learning.oreilly.com/library/view/~/9781118031834/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118031834">https://learning.oreilly.com/library/view/~/9781118031834</a><br/>Format: Electronic Resources<br/>Information theoryent://SD_ILS/0/SD_ILS:20557762025-09-07T04:42:42Z2025-09-07T04:42:42Zby Alencar, Marcelo S., 1957-, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1826004">Click to View</a><br/>Format: Electronic Resources<br/>Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World Warent://SD_ILS/0/SD_ILS:22026362025-09-07T04:42:42Z2025-09-07T04:42:42Zby Ball, Desmond<br/><a href="https://library.oapen.org/bitstream/20.500.12657/33529/1/459995.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/34520">DOAB: description of the publication</a><br/>Format: Books<br/>Security : Secrets, Intruders and ID Tags.ent://SD_ILS/0/SD_ILS:13267442025-09-07T04:42:42Z2025-09-07T04:42:42Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:22990552025-09-07T04:42:42Z2025-09-07T04:42:42Zby Bahi, Jacques Mohcine, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781466554511">https://learning.oreilly.com/library/view/~/9781466554511</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar">https://go.oreilly.com/library-access/library/view/-/9781466554511/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466554511/?ar">https://learning.oreilly.com/library/view/~/9781466554511/?ar</a><br/>Format: Electronic Resources<br/>Nanomechanics and Nanoelectronics : Molecule-Size Machines.ent://SD_ILS/0/SD_ILS:13267452025-09-07T04:42:42Z2025-09-07T04:42:42Zby Patch, Kimberly.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=3411448">Click to View</a><br/>Format: Electronic Resources<br/>Optical coding theory with primeent://SD_ILS/0/SD_ILS:22992782025-09-07T04:42:42Z2025-09-07T04:42:42Zby Kwong, Wing C.<br/><a href="https://learning.oreilly.com/library/view/~/9781466567818">https://learning.oreilly.com/library/view/~/9781466567818</a>
<a href="https://learning.oreilly.com/library/view/~/9781466567818/?ar">https://learning.oreilly.com/library/view/~/9781466567818/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781466567818/?ar">https://go.oreilly.com/library-access/library/view/-/9781466567818/?ar</a><br/>Format: Electronic Resources<br/>Mistrust -- Ethnographic Approximationsent://SD_ILS/0/SD_ILS:21994072025-09-07T04:42:42Z2025-09-07T04:42:42Zby Mühlfried, Florian<br/><a href="https://library.oapen.org/bitstream/20.500.12657/30739/1/643130.pdf">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/31434">DOAB: description of the publication</a><br/>Format: Books<br/>