Search Results - "cryptography"

Refine Results
  1. 1

    Introduction to cryptography : with coding theory / by Trappe, Wade

    Published 2006
    Subjects:
    View in OPAC
    Book
  2. 2

    Applied cryptography : protocols, algorithms, and source code in C / by Schneier, Bruce

    Published 2015
    Subjects: “…Cryptography. 61141…”
    View in OPAC
    Book
  3. 3

    Cryptography and network security / by Forouzan, Behrouz A.

    Published 2008
    Subjects:
    View in OPAC
    Book
  4. 4

    Cryptography and network security : principles and practice / by Stallings, William

    Published 2014
    View in OPAC
    Book
  5. 5
  6. 6

    Fault Tolerant Architectures for Cryptography and Hardware Security

    Published 2018
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  7. 7

    Kriptografiye giriş : şifreleme teorisi / by Afacan, Erkan

    Published 2016
    Subjects: “…Cryptography. 61141…”
    View in OPAC
    Book
  8. 8
  9. 9

    Multi-photon Quantum Secure Communication by Verma, Pramode K., El Rifai, Mayssaa, Chan, Kam Wai Clifford

    Published 2019
    Table of Contents: “…Introduction to Classical Cryptography -- Contemporary Quantum Key Distribution Techniques -- The Y-00 Protocol -- Multi-stage Multi-Photon Techniques in Cryptography -- Variations of Multi-Photon Protocols -- Multi-stage Multi-Photon Techniques in Wireless Communication -- Cryptographic strength of Multi-Photon Techniques -- Intrusion Detection System using the Polarization Channel -- Secure Key Transfer Using the Polarization Channel. .…”
    Full-text access
    View in OPAC
    e-Book
  10. 10
  11. 11

    Domain Specific High-Level Synthesis for Cryptographic Workloads by Khalid, Ayesha, Paul, Goutam, Chattopadhyay, Anupam

    Published 2019
    Table of Contents: “…Introduction -- Background -- Dwarfs of Cryptography -- High Level Synthesis for Symmetric Key Cryptography -- Manual Optimizations for Efficient Designs -- Study of Flexibility -- Study of Scalability -- Efficient Cryptanalytic Hardware -- Conclusion and Future Work.…”
    Full-text access
    View in OPAC
    e-Book
  12. 12
  13. 13

    Hardware Protection through Obfuscation

    Published 2017
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  14. 14
  15. 15

    Watermarking Security by Bas, Patrick, Furon, Teddy, Cayre, François, Doërr, Gwenaël, Mathon, Benjamin

    Published 2016
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  16. 16

    The Hardware Trojan War Attacks, Myths, and Defenses /

    Published 2018
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  17. 17

    Hardware IP Security and Trust

    Published 2017
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  18. 18

    Mobile and Wireless Technologies 2016

    Published 2016
    Subjects:
    Full-text access
    View in OPAC
    e-Book
  19. 19
  20. 20

    Java programlama diliyle kriptoloji uygulamaları / by Bodur, Hüseyin

    Published 2016
    Subjects:
    View in OPAC
    Book