Search Results for Cryptography - Narrowed by: Cryptography - Open Access BookSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-11T09:36:16ZContemporary cryptographyent://SD_ILS/0/SD_ILS:7993722024-06-11T09:36:16Z2024-06-11T09:36:16Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number Z103 O66 2011<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2011<br/>ISBN 9781608071456<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:4542992024-06-11T09:36:16Z2024-06-11T09:36:16Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number Z103 O66 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580536424<br/>Practical cryptographyent://SD_ILS/0/SD_ILS:3715262024-06-11T09:36:16Z2024-06-11T09:36:16Zby Ferguson, Niels<br/>Author Ferguson, Niels, Schneier, Bruce, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 F474 2003<br/>Publisher Wiley ,<br/>Publication Date 2003<br/>ISBN 9780471228943 9780471223573<br/>Cryptography decryptedent://SD_ILS/0/SD_ILS:3942002024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mel, H. X., 1948-<br/>Author Mel, H. X., 1948-, Baker, Doris M., 1953-<br/>Format: Books<br/>Call Number QA76.9.A25 M44 2001<br/>Publisher Addison-Wesley,<br/>Publication Date 2001<br/>ISBN 9780201616477<br/>Broadband quantum cryptographyent://SD_ILS/0/SD_ILS:7647602024-06-11T09:36:16Z2024-06-11T09:36:16Zby Rogers, Daniel J.<br/>Author Rogers, Daniel J.<br/>Format: Books<br/>Call Number QA76.9.A25 R64 2010<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2010<br/>ISBN 9781608450596<br/>Cryptography research perspectivesent://SD_ILS/0/SD_ILS:6425412024-06-11T09:36:16Z2024-06-11T09:36:16Zby Chen, Roland E.<br/>Author Chen, Roland E.<br/>Format: Books<br/>Call Number QA76.9.A25 C833 2009<br/>Publisher Nova Science Publishers,<br/>Publication Date 2009<br/>ISBN 9781604564921<br/>Cryptography for developersent://SD_ILS/0/SD_ILS:1709672024-06-11T09:36:16Z2024-06-11T09:36:16Zby St. Denis, Tom<br/>Author St. Denis, Tom, Johnson, Simon<br/>Format: Books<br/>Call Number QA76.9.A25 S725 2007<br/>Publisher Syngrees Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491044<br/>Introduction to cryptographyent://SD_ILS/0/SD_ILS:1527072024-06-11T09:36:16Z2024-06-11T09:36:16Zby Buchmann, Johannes A.<br/>Author Buchmann, Johannes A.<br/>Format: Books<br/>Call Number QA268 B82 2004<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2004<br/>ISBN 9780387207568<br/>Cryptography: an introductionent://SD_ILS/0/SD_ILS:3455092024-06-11T09:36:16Z2024-06-11T09:36:16Zby Smart, Nigel<br/>Author Smart, Nigel<br/>Format: Books<br/>Call Number QA76.9.A25 S62 2003<br/>Publisher McGraw-Hill Education ,<br/>Publication Date 2003<br/>ISBN 9780077099879<br/>Cryptography : an introductionent://SD_ILS/0/SD_ILS:7560352024-06-11T09:36:16Z2024-06-11T09:36:16Zby Yaschenko V. V.<br/>Author Yaschenko V. V.<br/>Format: Books<br/>Call Number QA76.9 .A25 V85 2002<br/>Series Title Student mathematical library, 1520-9121 ; v. 18<br/>Publisher American Mathematical Society,<br/>Publication Date 2002<br/>ISBN 9780821829868<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:2844422024-06-11T09:36:16Z2024-06-11T09:36:16Zby Katz, Jonathan, 1974-<br/>Author Katz, Jonathan, 1974-, Lindell, Yehuda<br/>Format: Books<br/>Call Number QA76.9.A25 K37 2008<br/>Publisher Chapman & Hall,<br/>Publication Date 2008<br/>ISBN 9781584885511<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:8358552024-06-11T09:36:16Z2024-06-11T09:36:16Zby Katz, Jonathan, 1974- author<br/>Author Katz, Jonathan, 1974- author, Lindell, Yehuda, author<br/>Format: Books<br/>Call Number QA76.9.A25 K38 2015<br/>Edition Second edition<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466570269<br/>Cryptography : Infosec pro guideent://SD_ILS/0/SD_ILS:8073712024-06-11T09:36:16Z2024-06-11T09:36:16Zby Oriyano, Sean-Philip<br/>Author Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5102.94 O75 2013<br/>Publisher McGraw-Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071794251<br/>Cryptography and information securityent://SD_ILS/0/SD_ILS:3165372024-06-11T09:36:16Z2024-06-11T09:36:16Zby Pachghare, V. K.<br/>Author Pachghare, V. K.<br/>Format: Books<br/>Call Number QA76.9.A25 P32 2009<br/>Publisher Prentice Hall of India,<br/>Publication Date 2009<br/>ISBN 9788120335219<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:1953342024-06-11T09:36:16Z2024-06-11T09:36:16Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.A25 K664 2007<br/>Publisher Wiley-Interscience,<br/>Publication Date 2007<br/>ISBN 9780471947837<br/>Cryptography : theory and practiceent://SD_ILS/0/SD_ILS:1432272024-06-11T09:36:16Z2024-06-11T09:36:16Zby Stinson, Douglas R. (Douglas Robert), 1956-<br/>Author Stinson, Douglas R. (Douglas Robert), 1956-<br/>Format: Books<br/>Call Number QA268 S74 2006<br/>Edition 3rd ed.<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2006<br/>ISBN 9781584885085<br/>Quantum communications and cryptographyent://SD_ILS/0/SD_ILS:4908772024-06-11T09:36:16Z2024-06-11T09:36:16Zby Sergienko, Alexander V.<br/>Author Sergienko, Alexander V.<br/>Format: Books<br/>Call Number TK5102.94 Q36 2005<br/>Publisher CRC Press,<br/>Publication Date 2006<br/>ISBN 9780849336843<br/>Beginning cryptography with Javaent://SD_ILS/0/SD_ILS:5372352024-06-11T09:36:16Z2024-06-11T09:36:16Zby Hook, David, 1962-<br/>Author Hook, David, 1962-<br/>Format: Books<br/>Call Number QA76.9.A25 H66 2005<br/>Publisher Wiley Pub.,<br/>Publication Date 2005<br/>ISBN 9780764596339<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:3955292024-06-11T09:36:16Z2024-06-11T09:36:16Zby Young, Adam, 1972-<br/>Author Young, Adam, 1972-, Yung, Moti<br/>Format: Books<br/>Call Number QA 76.9 .A25 Y68 2004<br/>Publisher Wiley Pub.,<br/>Publication Date 2004<br/>ISBN 9780764549755<br/>Cryptography and secure communicationsent://SD_ILS/0/SD_ILS:2990722024-06-11T09:36:16Z2024-06-11T09:36:16Zby Man, Young Rhee<br/>Author Man, Young Rhee<br/>Format: Books<br/>Call Number QA76.9.A25 R43 1994<br/>Publisher McGraw-Hill,<br/>Publication Date 1994<br/>ISBN 9780071125024<br/>Number theory and cryptographyent://SD_ILS/0/SD_ILS:2598072024-06-11T09:36:16Z2024-06-11T09:36:16Zby Loxton, J. H.<br/>Author Loxton, J. H.<br/>Format: Books<br/>Call Number QA241 N95 1990<br/>Publisher Cambridge University Press,<br/>Publication Date 1990<br/>ISBN 9780521398770<br/>Cryptolib: cryptography in softwareent://SD_ILS/0/SD_ILS:4157092024-06-11T09:36:16Z2024-06-11T09:36:16Zby Lacy, John B.<br/>Author Lacy, John B.<br/>Format: Books<br/>Call Number MAK 5972<br/>Cryptography and data securityent://SD_ILS/0/SD_ILS:2960312024-06-11T09:36:16Z2024-06-11T09:36:16Zby Denning, Dorothy Elizabeth Robling<br/>Author Denning, Dorothy Elizabeth Robling<br/>Format: Books<br/>Call Number QA76.9.A25 D46 1982<br/>Publisher Addison-Wesley,<br/>Publication Date 1983 1982<br/>ISBN 9780201101508<br/>Introduction to cryptography : principles and applicationsent://SD_ILS/0/SD_ILS:1642192024-06-11T09:36:16Z2024-06-11T09:36:16Zby Delfs, Hans<br/>Author Delfs, Hans, Knebl, Helmut<br/>Format: Books<br/>Call Number QA76.9.A25 D44 2007<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/>Applications of cryptography and network securityent://SD_ILS/0/SD_ILS:8369342024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5102.94 A675 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632400659<br/>An introduction to number theory with cryptographyent://SD_ILS/0/SD_ILS:8345462024-06-11T09:36:16Z2024-06-11T09:36:16Zby Kraft, James S.<br/>Author Kraft, James S., Washington, Lawrence C.<br/>Format: Books<br/>Call Number QA241 K73 2014<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781482214413<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:8292472024-06-11T09:36:16Z2024-06-11T09:36:16Zby Welschenbach, Michael, author<br/>Author Welschenbach, Michael, author<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2013<br/>Edition 2nd ed.<br/>Publisher Apress,<br/>Publication Date 2013<br/>ISBN 9781430250982<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:8372922024-06-11T09:36:16Z2024-06-11T09:36:16Zby Cao, Zhenfu, author<br/>Author Cao, Zhenfu, author<br/>Format: Books<br/>Call Number TK5102.94 C36 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466501386<br/>Introduction to cryptography and network securityent://SD_ILS/0/SD_ILS:1558772024-06-11T09:36:16Z2024-06-11T09:36:16Zby Forouzan, Behrouz A.<br/>Author Forouzan, Behrouz A.<br/>Format: Books<br/>Call Number TK5105.59 F67 2008<br/>Publisher McGraw-Hill Higher Education,<br/>Publication Date 2007<br/>ISBN 9780073327532<br/>Quantum cryptography and secret-key distillationent://SD_ILS/0/SD_ILS:1349382024-06-11T09:36:16Z2024-06-11T09:36:16Zby Van Assche, Gilles<br/>Author Van Assche, Gilles<br/>Format: Books<br/>Call Number QA76.9.A25 V36 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521864855<br/>Complexity and cryptography : an introductionent://SD_ILS/0/SD_ILS:3909762024-06-11T09:36:16Z2024-06-11T09:36:16Zby Talbot, John<br/>Author Talbot, John, Welsh, D. J. A<br/>Format: Books<br/>Call Number Z103 T35 2006<br/>Publisher Cambridge University Press,<br/>Publication Date 2006<br/>ISBN 9780521852319<br/>Introduction to cryptography : with coding theoryent://SD_ILS/0/SD_ILS:3261122024-06-11T09:36:16Z2024-06-11T09:36:16Zby Trappe, Wade<br/>Author Trappe, Wade, Washington, Lawrence C.<br/>Format: Books<br/>Call Number QA268 T73 2006<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9780131981997 9780131862395<br/>Modern cryptography : theory and practiceent://SD_ILS/0/SD_ILS:1563142024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mao, Wenbo<br/>Author Mao, Wenbo<br/>Format: Books<br/>Call Number QA76.9.A25 M36 2004<br/>Publisher Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780130669438<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:4371442024-06-11T09:36:16Z2024-06-11T09:36:16Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Books<br/>Call Number TK5105.59 B87 2004<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254952<br/>Introduction to cryptography with Java appletsent://SD_ILS/0/SD_ILS:4192772024-06-11T09:36:16Z2024-06-11T09:36:16Zby Bishop, David, 1963-<br/>Author Bishop, David, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 B57 2003<br/>Publisher Jones and Bartlett,<br/>Publication Date 2003<br/>ISBN 9780763722074<br/>Introduction to cryptography : with coding theoryent://SD_ILS/0/SD_ILS:3589642024-06-11T09:36:16Z2024-06-11T09:36:16Zby Trappe, Wade<br/>Author Trappe, Wade, Washington, Lawrence C.<br/>Format: Books<br/>Call Number QA268 T73 2002<br/>Publisher Pearson Education,<br/>Publication Date 2002<br/>ISBN 9780130618146<br/>Coding theory and cryptography : the essentialsent://SD_ILS/0/SD_ILS:3983102024-06-11T09:36:16Z2024-06-11T09:36:16Zby Hankerson, Darrel R.<br/>Author Hankerson, Darrel R.<br/>Format: Books<br/>Call Number QA268 C62 2000<br/>Edition 2nd ed., rev. and expanded<br/>Publisher Marcel Dekker,<br/>Publication Date 2000<br/>ISBN 9780824704650<br/>Cryptography : an introduction to computer securityent://SD_ILS/0/SD_ILS:4423852024-06-11T09:36:16Z2024-06-11T09:36:16Zby Seberry, Jennifer<br/>Author Seberry, Jennifer, Pieprzyk, Josef<br/>Format: Books<br/>Call Number QA76.9.A25 S37 1989<br/>Publisher Prentice Hall,<br/>Publication Date 1989<br/>ISBN 9780724802746 9780131949867<br/>Machine cryptography and modern cryptanalysisent://SD_ILS/0/SD_ILS:3270812024-06-11T09:36:16Z2024-06-11T09:36:16Zby Deavours, Cipher A.<br/>Author Deavours, Cipher A., Kruh, Louis<br/>Format: Books<br/>Call Number Z103.D42 1985<br/>Publisher Artech House,<br/>Publication Date 1985<br/>ISBN 9780890061619<br/>Quantum cryptography and computing : theory and implementationent://SD_ILS/0/SD_ILS:8128252024-06-11T09:36:16Z2024-06-11T09:36:16Zby Horodecki, Ryszard<br/>Author Horodecki, Ryszard, Kilin, Sergei Ya, Mowalik, Janusz<br/>Format: Books<br/>Call Number QA76.889 Q366 2010<br/>Publisher IOS Press,<br/>Publication Date 2010<br/>ISBN 9781607505464<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-06-11T09:36:16Z2024-06-11T09:36:16Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Understanding and applying cryptography and data securityent://SD_ILS/0/SD_ILS:3375792024-06-11T09:36:16Z2024-06-11T09:36:16Zby Elbirt, Adam J.<br/>Author Elbirt, Adam J.<br/>Format: Books<br/>Call Number QA76.9.A25 E43 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420061604<br/>Topics in geometry, coding theory and cryptographyent://SD_ILS/0/SD_ILS:1713812024-06-11T09:36:16Z2024-06-11T09:36:16Zby Garcia, Arnaldo<br/>Author Garcia, Arnaldo, Stichtenoth, H., (Henning), 1944-<br/>Format: Books<br/>Call Number QA268 T66 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9781402053337 9781402053344<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">View Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Wireless security and cryptography : specifications and implementationsent://SD_ILS/0/SD_ILS:2885062024-06-11T09:36:16Z2024-06-11T09:36:16Zby Sklavos, Nicolas<br/>Author Sklavos, Nicolas, Zhang, Xinmiao<br/>Format: Books<br/>Call Number TK5103.2 W64 2007<br/>Publisher CRC Pr.,<br/>Publication Date 2007<br/>ISBN 9780849387715<br/>Java cryptography extensions : practical guide for programmersent://SD_ILS/0/SD_ILS:3974432024-06-11T09:36:16Z2024-06-11T09:36:16Zby Weiss, Jason<br/>Author Weiss, Jason<br/>Format: Books<br/>Call Number QA76.73.J38 W444 2004<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2004<br/>ISBN 9780127427515<br/>Protocols and procedures of cryptography and network securityent://SD_ILS/0/SD_ILS:8351562024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5105.59 P768 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632404237<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:8140262024-06-11T09:36:16Z2024-06-11T09:36:16Zby Rass, Stefan<br/>Author Rass, Stefan, Slamanig, Daniel, author<br/>Format: Books<br/>Call Number QA76.9.A25 R37 2014<br/>Publisher Artech House,<br/>Publication Date 2014<br/>ISBN 9781608075751<br/>Chaos synchronization and cryptography for secure communications : applications for encryptionent://SD_ILS/0/SD_ILS:6304542024-06-11T09:36:16Z2024-06-11T09:36:16Zby Banerjee, Santo, 1976-<br/>Author Banerjee, Santo, 1976-<br/>Format: Books<br/>Call Number TK5102.94 C43 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781615207374 9781615207381<br/>Primality testing and integer factorization in public-key cryptographyent://SD_ILS/0/SD_ILS:3447522024-06-11T09:36:16Z2024-06-11T09:36:16Zby Yan, Song Y.<br/>Author Yan, Song Y.<br/>Format: Books<br/>Call Number QA76.9.A25 Y364 2009<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2009<br/>ISBN 9780387772677<br/>Cryptography in the database : the last line of defenseent://SD_ILS/0/SD_ILS:4652192024-06-11T09:36:16Z2024-06-11T09:36:16Zby Kenan, Kevin<br/>Author Kenan, Kevin<br/>Format: Books<br/>Call Number QA76.9.D314 K45 2006<br/>Publisher Addison Wesley,<br/>Publication Date 2006<br/>ISBN 9780321320735<br/>A classical introduction to cryptography : applications for communications securityent://SD_ILS/0/SD_ILS:944212024-06-11T09:36:16Z2024-06-11T09:36:16Zby Vaudenay, Serge<br/>Author Vaudenay, Serge<br/>Format: Books<br/>Call Number QA76.9.A25 V38 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387254647<br/>Cryptography, information theory, and error-correction : a handbook for the 21st centuryent://SD_ILS/0/SD_ILS:4247812024-06-11T09:36:16Z2024-06-11T09:36:16Zby Bruen, Aiden A., 1941-<br/>Author Bruen, Aiden A., 1941-, Forcinito, Mario, 1962-<br/>Format: Books<br/>Call Number QA 76.9.A25 B79 2005<br/>Publisher Wiley-Interscience,<br/>Publication Date 2005<br/>ISBN 9780471653172<br/>Cryptography and public key infrastructure on the Internetent://SD_ILS/0/SD_ILS:3722722024-06-11T09:36:16Z2024-06-11T09:36:16Zby Schmeh, Klaus<br/>Author Schmeh, Klaus<br/>Format: Books<br/>Call Number QA76.9.A25 S33 2003<br/>Publisher Wiley,<br/>Publication Date 2003<br/>ISBN 9780470847459<br/>Cryptography for Internet and database applications : developing secret and public key techniques with Javaent://SD_ILS/0/SD_ILS:3707252024-06-11T09:36:16Z2024-06-11T09:36:16Zby Galbreath, Nick<br/>Author Galbreath, Nick<br/>Format: Books<br/>Call Number QA76.9.A25 G34 2002<br/>Publisher Wiley Publishing,<br/>Publication Date 2002<br/>ISBN 9780471210290<br/>Cryptography and e-commerce : a Wiley tech briefent://SD_ILS/0/SD_ILS:3716012024-06-11T09:36:16Z2024-06-11T09:36:16Zby Graff, Jon C.<br/>Author Graff, Jon C.<br/>Format: Books<br/>Call Number QA76.9.A25 G72 2001<br/>Publisher John Wiley,<br/>Publication Date 2001<br/>ISBN 9780471405740<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:4528222024-06-11T09:36:16Z2024-06-11T09:36:16Zby Schneier, Bruce, 1963-<br/>Author Schneier, Bruce, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 S36 1996<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 1996<br/>ISBN 9780471117094<br/>The application of cryptography for data base securityent://SD_ILS/0/SD_ILS:6406512024-06-11T09:36:16Z2024-06-11T09:36:16Zby Gudes, Ehud<br/>Author Gudes, Ehud, Koch, Harvey S., Stahl, Fred A.<br/>Format: Books<br/>Call Number MAK 16855<br/>Publication Date 1976<br/>Concurrent zero knowledgeent://SD_ILS/0/SD_ILS:946722024-06-11T09:36:16Z2024-06-11T09:36:16Zby Rosen, Alon<br/>Author Rosen, Alon, Goldreich, Oded<br/>Format: Books<br/>Call Number QA76.9.A25 R674 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540329381<br/>CRYPTOLOGY : Classical and Modernent://SD_ILS/0/SD_ILS:8823292024-06-11T09:36:16Z2024-06-11T09:36:16Zby Klima, Richard E., author<br/>Author Klima, Richard E., author, Sigmon, Neil, author<br/>Format: Books<br/>Call Number TK5102.94 K55 2019<br/>Edition Second Edition<br/>Publication Date 2019<br/>ISBN 9781138047624<br/>Integrated researh in steganographyent://SD_ILS/0/SD_ILS:8371022024-06-11T09:36:16Z2024-06-11T09:36:16Zby Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>Algebraic geometry modeling in information theoryent://SD_ILS/0/SD_ILS:8013802024-06-11T09:36:16Z2024-06-11T09:36:16Zby Martínez-Moro, Edgar<br/>Author Martínez-Moro, Edgar<br/>Format: Books<br/>Call Number QA268 A44 2013<br/>Publisher World Scientific,<br/>Publication Date 2013<br/>ISBN 9789814335751<br/>Advanced linear cryptanalysis of block and stream ciphersent://SD_ILS/0/SD_ILS:7960132024-06-11T09:36:16Z2024-06-11T09:36:16Zby Junod, Pascal, 1976-<br/>Author Junod, Pascal, 1976-, Canteaut, Anne<br/>Format: Books<br/>Call Number Z103 A38 2011<br/>Publisher IOS Press,<br/>Publication Date 2011<br/>ISBN 9781607508434<br/>Hacking miracles : the true strories of inventors and cyberspace pioneer such as Alexander Bell, Thomas Edison, Steve Jobs, Bill Gates and othersent://SD_ILS/0/SD_ILS:8166732024-06-11T09:36:16Z2024-06-11T09:36:16Zby Gubitosa, Carlo<br/>Author Gubitosa, Carlo<br/>Format: Books<br/>Call Number QA76.76.O63 G83 2011<br/>Publisher Jaico Publishing House,<br/>Publication Date 2011<br/>ISBN 9788184952018<br/>Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:7587942024-06-11T09:36:16Z2024-06-11T09:36:16Zby Heiderich, Mario<br/>Author Heiderich, Mario<br/>Format: Books<br/>Call Number QA76.625 H46 2011<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496049<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:6396362024-06-11T09:36:16Z2024-06-11T09:36:16Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.H36 K65 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780470344736<br/>Expert SQL server 2008 encryptionent://SD_ILS/0/SD_ILS:6407182024-06-11T09:36:16Z2024-06-11T09:36:16Zby Coles, Michael, 1972-<br/>Author Coles, Michael, 1972-, Landrum, Rodney<br/>Format: Books<br/>Call Number QA76.9.A25 C653 2009<br/>Publisher Apress,<br/>Publication Date 2009<br/>ISBN 9781430224648 9781430224655<br/>Information theory, coding and crytographyent://SD_ILS/0/SD_ILS:3893782024-06-11T09:36:16Z2024-06-11T09:36:16Zby Bose, Ranjan<br/>Author Bose, Ranjan<br/>Format: Books<br/>Call Number TK5102.92 B67 2008<br/>Edition 2nd ed.<br/>Publisher Tata McGraw Hill Education Private Limited,<br/>Publication Date 2008<br/>ISBN 9780070669017<br/>Modern cryptanalysis : techniques for advanced code breakingent://SD_ILS/0/SD_ILS:2873252024-06-11T09:36:16Z2024-06-11T09:36:16Zby Swenson, Christopher<br/>Author Swenson, Christopher<br/>Format: Books<br/>Call Number QA76.9.A25 S932 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470135938<br/>Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computersent://SD_ILS/0/SD_ILS:3301552024-06-11T09:36:16Z2024-06-11T09:36:16Zby Morsch, Oliver<br/>Author Morsch, Oliver<br/>Format: Books<br/>Call Number QA76.889 M67 2008<br/>Publisher Wiley-VCH,<br/>Publication Date 2008<br/>ISBN 9783527407101<br/>Applied cryptanalysis : breaking ciphers in the real worldent://SD_ILS/0/SD_ILS:1558932024-06-11T09:36:16Z2024-06-11T09:36:16Zby Stamp, Mark<br/>Author Stamp, Mark, Low, Richard M., 1967-<br/>Format: Books<br/>Call Number QA76.9.A25 S68 2007<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2007<br/>ISBN 9780470114865<br/>Decrypted secrets : methods and maxims of cryptologyent://SD_ILS/0/SD_ILS:1580352024-06-11T09:36:16Z2024-06-11T09:36:16Zby Bauer, Friedrich Ludwig, 1924-<br/>Author Bauer, Friedrich Ludwig, 1924-<br/>Format: Books<br/>Call Number QA76.9.A25 B38 2007<br/>Edition 4th, rev. and extended ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540245025<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">FullText</a><br/>Finite fields and applicationsent://SD_ILS/0/SD_ILS:3205402024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mullen, Gary L.<br/>Author Mullen, Gary L., Mummert, Carl, 1978-<br/>Format: Books<br/>Call Number QA247.3 M85 2007<br/>Publisher American Mathematical Society,<br/>Publication Date 2007<br/>ISBN 9780821844182<br/>Cryptographic algorithms on reconfigurable hardwareent://SD_ILS/0/SD_ILS:1580182024-06-11T09:36:16Z2024-06-11T09:36:16Zby Rodriquez-Henriquez, Francisco<br/>Author Rodriquez-Henriquez, Francisco<br/>Format: Books<br/>Call Number QA76.9.A3 C79 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387338835<br/>Provider independent cryptographic toolsent://SD_ILS/0/SD_ILS:3737312024-06-11T09:36:16Z2024-06-11T09:36:16Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S8337 2006 af<br/>Publisher Penerbit UTM,<br/>Publication Date 2006<br/>ISBN 9789673531097<br/>Cryptographic libraries for developersent://SD_ILS/0/SD_ILS:4544192024-06-11T09:36:16Z2024-06-11T09:36:16Zby Moyle, Ed, 1973-<br/>Author Moyle, Ed, 1973-, Kelley, Diana, 1965-<br/>Format: Books<br/>Call Number QA76.76.D47 M79 2006<br/>Edition 1st ed.<br/>Publisher Charles River Media,<br/>Publication Date 2006<br/>ISBN 9781584504092<br/>Practical cryptology and Web securityent://SD_ILS/0/SD_ILS:4704772024-06-11T09:36:16Z2024-06-11T09:36:16Zby Yuen, P.K.<br/>Author Yuen, P.K.<br/>Format: Books<br/>Call Number TK5102.94 Y83 2006<br/>Publisher Pearson Education LTD,<br/>Publication Date 2006<br/>ISBN 9780321263339<br/>Cryptanalysis in cryptographic algorithm designent://SD_ILS/0/SD_ILS:4614762024-06-11T09:36:16Z2024-06-11T09:36:16Zby Muhammad Reza Z'aba<br/>Author Muhammad Reza Z'aba, Badrisham Ahmad, Subariah Ibrahim, Mohd. Aizaini Maarof, National ICT Conference (2006 : Perlis)<br/>Format: Books<br/>Call Number QA76.9.A25 C794<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Authentification codes and combinatorial designsent://SD_ILS/0/SD_ILS:1432222024-06-11T09:36:16Z2024-06-11T09:36:16Zby Pei, Dingyi<br/>Author Pei, Dingyi<br/>Format: Books<br/>Call Number QA76.9.A25 P446 2006<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2006<br/>ISBN 9781584864738 9781584884736<br/>Classical and contemporary cryptologyent://SD_ILS/0/SD_ILS:4434182024-06-11T09:36:16Z2024-06-11T09:36:16Zby Spillman, Richard J.<br/>Author Spillman, Richard J.<br/>Format: Books<br/>Call Number QA268 S64 2005<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2005<br/>ISBN 9780131828315<br/>Analysis of image quality for steganographic softwareent://SD_ILS/0/SD_ILS:4547702024-06-11T09:36:16Z2024-06-11T09:36:16Zby Azizah Abd. Manaf, Prof. Dr.<br/>Author Azizah Abd. Manaf, Prof. Dr., M. Z. Akram, K. Salehuddin, Sayuthi Jaafar, Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format: Books<br/>Call Number QA76.9.A25 A53 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Intelligent watermarking techniquesent://SD_ILS/0/SD_ILS:4192912024-06-11T09:36:16Z2024-06-11T09:36:16Zby Pan, Jeng-Shyang<br/>Author Pan, Jeng-Shyang, Huang, Hsiang-Cheh, Jain, Lakhmi C.<br/>Format: Books<br/>Call Number QA76.9.A25 I574 2004<br/>Publisher World Scientific,<br/>Publication Date 2004<br/>ISBN 9789812389558 9789812387578<br/>Public key crypto hardware for real-time security applicationent://SD_ILS/0/SD_ILS:4001652024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mohamed Khalil Mohd. Hani<br/>Author Mohamed Khalil Mohd. Hani, Hau, Yuan Wen, 1980-, Lim, Kie Woon, National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M54 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:4201472024-06-11T09:36:16Z2024-06-11T09:36:16Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Books<br/>Call Number QA76.9.A25 C344 2004<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Cryptanalysis of number theoretic ciphersent://SD_ILS/0/SD_ILS:3746632024-06-11T09:36:16Z2024-06-11T09:36:16Zby Wagstaff Jr., Samuel S.<br/>Author Wagstaff Jr., Samuel S.<br/>Format: Books<br/>Call Number QA76.9.A25 W33 2003<br/>Publisher Chapman & Hall,<br/>Publication Date 2003<br/>ISBN 9781584881537<br/>System-on-chip architectures and implementations for private-key data encryptionent://SD_ILS/0/SD_ILS:4093912024-06-11T09:36:16Z2024-06-11T09:36:16Zby McLoone, Maire<br/>Author McLoone, Maire, McCanny, J. V.<br/>Format: Books<br/>Call Number QA76.9.A25 M564 2003<br/>Publisher Kluwer Academic/Plenum Publishers,<br/>Publication Date 2003<br/>ISBN 9780306478826<br/>Asas kriptografient://SD_ILS/0/SD_ILS:3516242024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Mazleena Salleh, Subariah Ibrahim, Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number Z103 M34 2003<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>ISBN 9789835203138<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-06-11T09:36:16Z2024-06-11T09:36:16Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Secure E-voting with blind signatureent://SD_ILS/0/SD_ILS:3274562024-06-11T09:36:16Z2024-06-11T09:36:16Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Maznah Kamat, 1960-, Mazleena Salleh, Shah Rizan Abdul Aziz, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 S424 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Coding theory and cryptologyent://SD_ILS/0/SD_ILS:3638272024-06-11T09:36:16Z2024-06-11T09:36:16Zby Niederreiter, Harald<br/>Author Niederreiter, Harald<br/>Format: Books<br/>Call Number QA268 C66 2002<br/>Publisher World Scientific,<br/>Publication Date 2002<br/>ISBN 9789812381323<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-06-11T09:36:16Z2024-06-11T09:36:16Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Auditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-06-11T09:36:16Z2024-06-11T09:36:16Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Cryptographic applications in database security : a survey studyent://SD_ILS/0/SD_ILS:3267202024-06-11T09:36:16Z2024-06-11T09:36:16Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Piper, Fred, Norbik Bashah Idris, Ciechanowicz, Zbigniew 'Chez', International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.A25 Z344 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>A generalized group signature schemeent://SD_ILS/0/SD_ILS:3012392024-06-11T09:36:16Z2024-06-11T09:36:16Zby Eddie Shahril Ismail<br/>Author Eddie Shahril Ismail, Yahya Abu Hasan, 1953-, How, Guan Aun<br/>Format: Books<br/>Call Number QA268 E33 2001<br/>Publisher Universiti Sains Malaysia,<br/>Publication Date 2001<br/>The multiple RSA cryptosystement://SD_ILS/0/SD_ILS:3012692024-06-11T09:36:16Z2024-06-11T09:36:16Zby How, Guan Aun<br/>Author How, Guan Aun, Yahya Abu Bakar, Eddie Shahril Ismail<br/>Format: Books<br/>Call Number QA76.9.A25 H68 2001<br/>Publisher Universiti Sains Malaysia,<br/>Publication Date 2001<br/>Rijndael : comparison with other symmetric-key ciphersent://SD_ILS/0/SD_ILS:3016312024-06-11T09:36:16Z2024-06-11T09:36:16Zby Mazleena Salleh<br/>Author Mazleena Salleh, Subariah Ibrahim, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 R54 2001<br/>Publisher UNITEN,<br/>Publication Date 2001<br/>Satu skema tandatangan buta digitalent://SD_ILS/0/SD_ILS:3304772024-06-11T09:36:16Z2024-06-11T09:36:16Zby Eddie Shahril Ismail<br/>Author Eddie Shahril Ismail, How, Guan Aun, Yahya Abu Hasan, 1953-, Universiti Sains Malaysia. Pusat Pengajian Sains Matematik<br/>Format: Books<br/>Call Number QA76.9.A25 E32 2001<br/>Publisher Universiti Sains Malaysia,<br/>Publication Date 2001<br/>Decrypted secrets : methods and maxims of cryptologyent://SD_ILS/0/SD_ILS:1572912024-06-11T09:36:16Z2024-06-11T09:36:16Zby Bauer, Friedrich Ludwig<br/>Author Bauer, Friedrich Ludwig<br/>Format: Books<br/>Call Number QA76.9.A25 B38 2000<br/>Edition 2nd ed.<br/>Publisher Springer-Verlag,<br/>Publication Date 2000<br/>ISBN 9783540668718<br/>A traceable proactive anonymous electronic cashent://SD_ILS/0/SD_ILS:1395382024-06-11T09:36:16Z2024-06-11T09:36:16Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5102.94 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Security control and analysis systement://SD_ILS/0/SD_ILS:4816102024-06-11T09:36:16Z2024-06-11T09:36:16Zby Norbik Bashah Idris<br/>Author Norbik Bashah Idris, Subariah Ibrahim, Mazleena Salleh, Nik Khairul Raja Abdullah<br/>Format: Books<br/>Call Number MAK 12825 a<br/>Publication Date 2000<br/>Cryptographic protocol for payment transactionent://SD_ILS/0/SD_ILS:1361822024-06-11T09:36:16Z2024-06-11T09:36:16Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, TENCON '2000 (2000 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Public-key crytographyent://SD_ILS/0/SD_ILS:1573092024-06-11T09:36:16Z2024-06-11T09:36:16Zby Salomaa, Arto<br/>Author Salomaa, Arto<br/>Format: Books<br/>Call Number QA76.9.A25 S26 1996<br/>Edition 2nd ed.<br/>Publisher Springer-Verlag,<br/>Publication Date 1996<br/>ISBN 9783540613565<br/>Building in big brother : the crytographic policy debateent://SD_ILS/0/SD_ILS:1574002024-06-11T09:36:16Z2024-06-11T09:36:16Zby Hoffman, Lance J.<br/>Author Hoffman, Lance J.<br/>Format: Books<br/>Call Number QA76.9.A25 B85 1995<br/>Publisher Springer-Verlag,<br/>Publication Date 1995<br/>ISBN 9780387944418<br/>Analysis of modified improved geffe random sequence generatorent://SD_ILS/0/SD_ILS:4049712024-06-11T09:36:16Z2024-06-11T09:36:16Zby Ahmad Zuri Sha'ameri<br/>Author Ahmad Zuri Sha'ameri, Tuan Sabri Tuan Mat, Kamaruzzaman Seman, International Conference on Communication (2nd : 1995 : Langkawi)<br/>Format: Books<br/>Call Number MAK 11944 a<br/>Publisher UTM,<br/>Publication Date 1995<br/>Cryptologyent://SD_ILS/0/SD_ILS:4105592024-06-11T09:36:16Z2024-06-11T09:36:16Zby Beutelspacher, Albrecht<br/>Author Beutelspacher, Albrecht, Fisher, J. Chris<br/>Format: Books<br/>Call Number Z103 B48 1994<br/>Publisher Mathematical Association of America,<br/>Publication Date 1994<br/>ISBN 9780883855041<br/>Contemporary cryptology : the science of information integrityent://SD_ILS/0/SD_ILS:4100852024-06-11T09:36:16Z2024-06-11T09:36:16Zby Simmons, Gustavus J.<br/>Author Simmons, Gustavus J., Institute of Electrical and Electronics Engineers<br/>Format: Books<br/>Call Number QA76.9.A25 C64 1992<br/>Publisher IEEE Press,<br/>Publication Date 1992<br/>ISBN 9780879422776<br/>Cryptology : machines, history and methodsent://SD_ILS/0/SD_ILS:1942612024-06-11T09:36:16Z2024-06-11T09:36:16Zby Deavours, Cipher A.<br/>Author Deavours, Cipher A.<br/>Format: Books<br/>Call Number Z103 C79 1989<br/>Publisher Artech House,<br/>Publication Date 1989<br/>ISBN 9780890063996<br/>Modern cryptology : a tutorialent://SD_ILS/0/SD_ILS:1827552024-06-11T09:36:16Z2024-06-11T09:36:16Zby Brassard, Gilles<br/>Author Brassard, Gilles<br/>Format: Books<br/>Call Number Z103.B72 1988<br/>Publisher Springer-Verlag,<br/>Publication Date 1988<br/>ISBN 9780387968421<br/>Cipher systems : the protection of communicationsent://SD_ILS/0/SD_ILS:1575522024-06-11T09:36:16Z2024-06-11T09:36:16Zby Beker, Henry<br/>Author Beker, Henry, Piper, Fred<br/>Format: Books<br/>Call Number Z104.B44 1982<br/>Publisher Northwood Bks,<br/>Publication Date 1982<br/>ISBN 9780442306076<br/>Tutorial : the security of data in networksent://SD_ILS/0/SD_ILS:2544092024-06-11T09:36:16Z2024-06-11T09:36:16Zby Davies, D. W.<br/>Author Davies, D. W.<br/>Format: Books<br/>Call Number TK5105.5 D36 1981 f<br/>Publisher IEEE Computer Society,<br/>Publication Date 1981<br/>Mathematical recreations and essaysent://SD_ILS/0/SD_ILS:2958492024-06-11T09:36:16Z2024-06-11T09:36:16Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author Ball, W. W. Rouse (Walter William Rouse), 1850-1925, Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format: Books<br/>Call Number QA95.B3 1974<br/>Edition 12th ed.<br/>Publisher University of Toronto Press,<br/>Publication Date 1974<br/>ISBN 9780802018441<br/>Mathematical recreations & essaysent://SD_ILS/0/SD_ILS:2957532024-06-11T09:36:16Z2024-06-11T09:36:16Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author Ball, W. W. Rouse (Walter William Rouse), 1850-1925, Coxeter, H. S. M. (Harold Scott Macdonald), 1907-<br/>Format: Books<br/>Call Number QA95 B3 1947<br/>Edition American ed.<br/>Publisher Macmillan Co.,<br/>Publication Date 1947<br/>Mathematical recreations and essaysent://SD_ILS/0/SD_ILS:2966252024-06-11T09:36:16Z2024-06-11T09:36:16Zby Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Author Ball, W. W. Rouse (Walter William Rouse), 1850-1925<br/>Format: Books<br/>Call Number QA95.B3 1939<br/>Edition 11th ed.<br/>Publisher Macmillan,<br/>Publication Date 1939<br/>Information leakage of boolean fuctions and its relationship to other cryptographic criteriaent://SD_ILS/0/SD_ILS:4117952024-06-11T09:36:16Z2024-06-11T09:36:16Zby Zhang, M.<br/>Author Zhang, M., Tavares, S. E., Campbell, L. L.<br/>Format: Books<br/>Call Number MAK 5975<br/>Cryptographic relational algebraent://SD_ILS/0/SD_ILS:4176412024-06-11T09:36:16Z2024-06-11T09:36:16Zby Davida, George I.<br/>Author Davida, George I., Yeh, I.<br/>Format: Books<br/>Call Number MAK 5978<br/>Stream ciphers for high speed data transmissionent://SD_ILS/0/SD_ILS:4042532024-06-11T09:36:16Z2024-06-11T09:36:16Zby Tuan Sabri Tuan Mat<br/>Author Tuan Sabri Tuan Mat, Ahmad Zuri Sha'ameri, Malaysian Science and Technology Congress (1994 : Kuala Lumpur)<br/>Format: Books<br/>Call Number MAK 12011 a<br/>Hacking the Hacker: Learn From the Experts Who Take Down Hackersent://SD_ILS/0/SD_ILS:8726132024-06-11T09:36:16Z2024-06-11T09:36:16Zby Grimes, Roger A.<br/>Author Grimes, Roger A.<br/>Format: Books<br/>Call Number QA76.9.A25 G75 2017<br/>ISBN 9781119396215<br/>