Search Results for Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026pe$003dd$00253A$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-21T21:10:38Z Cryptography Made Simple ent://SD_ILS/0/SD_ILS:617695 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography. 1 ent://SD_ILS/0/SD_ILS:599697 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael.&#160;Rivain, Mattieu.&#160;O'Flynn, Colin.<br/>Preferred Shelf Number&#160;QA76.9 .A25 E43 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded Cryptography. 3 ent://SD_ILS/0/SD_ILS:599815 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351930</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Embedded cryptography 2 ent://SD_ILS/0/SD_ILS:599724 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Prouff, Emmanuel, editor.&#160;Renault, Guenael, editor.&#160;Rivain, Mattieu, editor.&#160;O'Flynn, Colin, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRACTICAL MATHEMATICAL CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:574057 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Gjosteen, Kristian.<br/>Preferred Shelf Number&#160;Z103<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003149422">https://www.taylorfrancis.com/books/9781003149422</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography for developers ent://SD_ILS/0/SD_ILS:147686 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;St. Denis, Tom.&#160;Johnson, Simon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491044">http://www.sciencedirect.com/science/book/9781597491044</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:106301 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA268 B83 2004<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to cryptography ent://SD_ILS/0/SD_ILS:93536 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Buchmann, Johannes.<br/>Preferred Shelf Number&#160;QA 268 .B83 2001<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Applied Quantum Cryptography ent://SD_ILS/0/SD_ILS:191072 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kollmitzer, Christian. editor.&#160;Pivk, Mario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04831-9">http://dx.doi.org/10.1007/978-3-642-04831-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography ent://SD_ILS/0/SD_ILS:189106 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bernstein, Daniel J. editor.&#160;Buchmann, Johannes. editor.&#160;Dahmen, Erik. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group-based Cryptography ent://SD_ILS/0/SD_ILS:198157 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Myasnikov, Alexei. author.&#160;Ushakov, Alexander. author.&#160;Shpilrain, Vladimir. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7643-8827-0">http://dx.doi.org/10.1007/978-3-7643-8827-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:109547 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Menezes, Alfred J.&#160;Van Oorschot, Paul C., ort. yaz.&#160;Vanstone, Scott A., ort. yaz.<br/>Preferred Shelf Number&#160;QA76.9.A25 M46 1997<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Fault Analysis in Cryptography ent://SD_ILS/0/SD_ILS:196746 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Joye, Marc. editor.&#160;Tunstall, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29656-7">http://dx.doi.org/10.1007/978-3-642-29656-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:364315 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Katz, Jonathan, 1974-&#160;Lindell, Yehuda.<br/>Preferred Shelf Number&#160;QA76.9.A25 K36 2015<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:386241 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kahate, Atul.<br/>Preferred Shelf Number&#160;TK5105.59 K12 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptography for Payment Professionals ent://SD_ILS/0/SD_ILS:561838 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dubinsky, Ilya, author.<br/>Preferred Shelf Number&#160;HG1710<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003371366">https://www.taylorfrancis.com/books/9781003371366</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing cryptography using Python ent://SD_ILS/0/SD_ILS:596198 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bray, Shannon, 1972-<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum communications and cryptography ent://SD_ILS/0/SD_ILS:543504 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sergienko, Alexander V.<br/>Preferred Shelf Number&#160;TK5102.94 .Q36 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420026603">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Beginning cryptography with Java ent://SD_ILS/0/SD_ILS:144203 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hook, David, 1962-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=142234</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:557931 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Alencar, Marcelo S., 1957- author.<br/>Preferred Shelf Number&#160;TK5102.94 .A44 2022<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003337768">https://www.taylorfrancis.com/books/9781003337768</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Applied Cryptography ent://SD_ILS/0/SD_ILS:546435 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Menezes, Alfred J., author.&#160;Katz, Jonathan, author.&#160;van Oorschot, Paul C., author.&#160;Vanstone, Scott A., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780429466335">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:544162 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ling, San, 1964, author.&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;QA268 .L545 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420079470">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:296865 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Konheim, Alan G., 1934-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.contentreserve.com/TitleInfo.asp?ID={24307C36-99BB-4A76-9317-7D1A7CC786FB}&Format=50">Click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780471947837">Available by subscription from Safari Books Online</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=288170</a> John Wiley <a href="http://dx.doi.org/10.1002/0470083980">http://dx.doi.org/10.1002/0470083980</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780471947837">http://proquest.tech.safaribooksonline.de/9780471947837</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to cryptography ent://SD_ILS/0/SD_ILS:543005 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Mollin, Richard A., 1947- author.<br/>Preferred Shelf Number&#160;QA268 .M65 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420011241">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> An introduction to cryptography ent://SD_ILS/0/SD_ILS:110595 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Mollin, Richard A., 1947-<br/>Preferred Shelf Number&#160;QA268 .M65 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:518569 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47974-2">https://doi.org/10.1007/978-3-662-47974-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:488823 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Applebaum, Benny. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography Principles and Applications ent://SD_ILS/0/SD_ILS:185185 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Delfs, Hans. author.&#160;Knebl, Helmut. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-49244-5">http://dx.doi.org/10.1007/3-540-49244-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Asymmetric cryptography : primitives and protocols ent://SD_ILS/0/SD_ILS:598096 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Pointcheval, David, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A83 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of financial cryptography and security ent://SD_ILS/0/SD_ILS:542098 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Rosenberg, Burton.<br/>Preferred Shelf Number&#160;HG1710 .H34 2010<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420059823">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:606898 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-71522-9">https://doi.org/10.1007/978-3-030-71522-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Embedded Systems Security ent://SD_ILS/0/SD_ILS:604651 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hou, Xiaolu. author.&#160;Breier, Jakub. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62205-2">https://doi.org/10.1007/978-3-031-62205-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Classical and Modern Cryptography for Beginners ent://SD_ILS/0/SD_ILS:520471 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Banoth, Rajkumar. author.&#160;Regar, Rekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32959-3">https://doi.org/10.1007/978-3-031-32959-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Bitcoin Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:342159 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Franco, Pedro.<br/>Preferred Shelf Number&#160;ONLINE(342159.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:364648 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kraft, James S., author.&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA241 K73 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:488413 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baldi, Marco. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-02556-8">https://doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public key cryptography applications and attacks ent://SD_ILS/0/SD_ILS:249342 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Batten, Lynn Margaret.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cryptography with Maple ent://SD_ILS/0/SD_ILS:333533 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;G&oacute;mez Pardo, Jos&eacute; Luis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333533.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32166-5">http://dx.doi.org/10.1007/978-3-642-32166-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:344263 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cao, Zhenfu.<br/>Preferred Shelf Number&#160;ONLINE(344263.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466501409">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Cryptography and Secret-Key Distillation ent://SD_ILS/0/SD_ILS:235140 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Assche, Gilles van .<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511617744">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Everyday Cryptography Fundamental Principles and Applications ent://SD_ILS/0/SD_ILS:279211 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Martin, Keith M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational number theory and modern cryptography ent://SD_ILS/0/SD_ILS:299126 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Yan, Song Y.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=1120602</a> Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118188606">http://onlinelibrary.wiley.com/book/10.1002/9781118188606</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118188606">http://dx.doi.org/10.1002/9781118188606</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1120602">http://swb.eblib.com/patron/FullRecord.aspx?p=1120602</a> OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={2B073896-0332-4673-A5D3-4882B46014FC}&Format=50</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual cryptography and secret image sharing ent://SD_ILS/0/SD_ILS:539468 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cimato, Stelvio.&#160;Yang, Ching-Nung.<br/>Preferred Shelf Number&#160;TA1637 .V544 2012<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315217659">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography, Automata and Learning Theory ent://SD_ILS/0/SD_ILS:365541 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Thomas, D. Gnanaraj, ed. lit.&#160;Jeyanthi, P. Abisha, ed. lit.<br/>Preferred Shelf Number&#160;QA76.9.A25 C79 2011<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Finite Automata and Application to Cryptography ent://SD_ILS/0/SD_ILS:188068 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tao, Renji. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:146450 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123744791">http://www.sciencedirect.com/science/book/9780123744791</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elementary Number Theory, Cryptography and Codes ent://SD_ILS/0/SD_ILS:185736 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baldoni, Maria Welleda. author.&#160;Ciliberto, Ciro. author.&#160;Cattaneo, Giulia Maria Piacentini. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69200-3">http://dx.doi.org/10.1007/978-3-540-69200-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gr&ouml;bner Bases, Coding, and Cryptography ent://SD_ILS/0/SD_ILS:189513 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sala, Massimiliano. editor.&#160;Sakata, Shojiro. editor.&#160;Mora, Teo. editor.&#160;Traverso, Carlo. editor.&#160;Perret, Ludovic. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Story From Counting to Cryptography ent://SD_ILS/0/SD_ILS:175665 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Higgins, Peter M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-001-8">http://dx.doi.org/10.1007/978-1-84800-001-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:167545 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Silverman, J.H. author.&#160;Pipher, Jill. author.&#160;Hoffstein, Jeffrey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information theory, coding and cryptography ent://SD_ILS/0/SD_ILS:386137 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bose, Ranjan.<br/>Preferred Shelf Number&#160;QA268 B743 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Elliptic curves : number theory and cryptography ent://SD_ILS/0/SD_ILS:539008 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Washington, Lawrence C., author.<br/>Preferred Shelf Number&#160;QA567.2 .E44 W37 2008<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420071474">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:170731 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Welschenbach, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-0026-0">http://dx.doi.org/10.1007/978-1-4302-0026-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RSA and public-key cryptography ent://SD_ILS/0/SD_ILS:543985 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA268 .M655 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035247">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Disappearing cryptography information hiding : steganography &amp; watermarking ent://SD_ILS/0/SD_ILS:253900 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Wayner, Peter, 1964-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781558607699">http://www.sciencedirect.com/science/book/9781558607699</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied satisfiability : cryptography, scheduling and coalitional games ent://SD_ILS/0/SD_ILS:599624 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Liao, Xiaojuan, author.&#160;Koshimura, Miyuki, author.<br/>Preferred Shelf Number&#160;QA76.9 .A3 L53 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394249817</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Analog Side Channels Using Cryptography Algorithms ent://SD_ILS/0/SD_ILS:520646 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Zaji&#263;, Alenka. author.&#160;Prvulovic, Milos. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-38579-7">https://doi.org/10.1007/978-3-031-38579-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern cryptography with proof techniques and implementations. ent://SD_ILS/0/SD_ILS:577000 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hwang, Seong Oun, author.&#160;Kim, Intae, author.&#160;Lee, Wai Kong, author.<br/>Preferred Shelf Number&#160;TK5102.94 .M63 2021<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003152569">https://www.taylorfrancis.com/books/9781003152569</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich ent://SD_ILS/0/SD_ILS:617808 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57048-8">https://doi.org/10.1007/978-3-319-57048-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:617119 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Wu, Chuan-Kun. author.&#160;Feng, Dengguo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical cryptography : algorithms and implementations using C++ ent://SD_ILS/0/SD_ILS:540133 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Azad, Saiful, editor.&#160;Pathan, Al-Sakib Khan, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P725 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482228908">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> An introduction to number theory with cryptography ent://SD_ILS/0/SD_ILS:544089 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kraft, James S., eauthor.&#160;Washington, Lawrence C., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA241<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482214420">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Chaos-Based Cryptography Theory,Algorithms and Applications ent://SD_ILS/0/SD_ILS:194408 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kocarev, Ljupco. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-20542-2">http://dx.doi.org/10.1007/978-3-642-20542-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:303838 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Davies, Joshua A. (Joshua Aaron)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255797">An electronic book accessible through the World Wide Web; click for information</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470920411">Available by subscription from Safari Books Online</a> <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=706899">Click here to view book</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=40694">http://www.books24x7.com/marc.asp?bookid=40694</a> Volltext <a href="http://proquest.safaribooksonline.com/9780470920411">http://proquest.safaribooksonline.com/9780470920411</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:169437 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Garcia, Arnaldo. editor.&#160;Stichtenoth, Henning. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless security and cryptography : specifications and implementations ent://SD_ILS/0/SD_ILS:543513 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sklavos, Nicolas.&#160;Zhang, Xinmiao.<br/>Preferred Shelf Number&#160;TK5103.2 .W57415 2007<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315222202">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A Classical Introduction to Cryptography Exercise Book ent://SD_ILS/0/SD_ILS:165571 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baig&egrave;neres, Thomas. author.&#160;Lu, Yi. author.&#160;Vaudenay, Serge. author.&#160;Junod, Pascal. author.&#160;Monnerat, Jean. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-28835-X">http://dx.doi.org/10.1007/0-387-28835-X</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of elliptic and hyperelliptic curve cryptography ent://SD_ILS/0/SD_ILS:547539 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cohen, Henri.&#160;Frey, Gerhard, 1944-&#160;Avanzi, Roberto.<br/>Preferred Shelf Number&#160;QA567.2 .E44 H36 2006 EB<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781420034981">https://www.taylorfrancis.com/books/9781420034981</a> Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367801625">https://www.taylorfrancis.com/books/9780367801625</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Cryptography Volume 2. Basic Applications. ent://SD_ILS/0/SD_ILS:236754 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Goldreich, Oded.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511721656">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java cryptography extensions practical guide for programmers ent://SD_ILS/0/SD_ILS:253797 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Weiss, Jason (Jason R.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780127427515">http://www.sciencedirect.com/science/book/9780127427515</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Cryptography Volume 1. Basic Tools. ent://SD_ILS/0/SD_ILS:237721 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Goldreich, Oded.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546891">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 1 : Design and security proofs ent://SD_ILS/0/SD_ILS:598803 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric cryptography. Volume 2 : Cryptanalysis and future directions ent://SD_ILS/0/SD_ILS:598806 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boura, Christina, editor.&#160;Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number&#160;Z104 .S966 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility ent://SD_ILS/0/SD_ILS:600179 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Arun, Jai Singh, author.&#160;Harishankar, Ray, author.&#160;Rjaibi, Walid, author.&#160;Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number&#160;QA76.889<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The confluence of cryptography, blockchain and artificial intelligence ent://SD_ILS/0/SD_ILS:566001 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ankita.&#160;Nayancy.&#160;Verma, Rajat.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781032711515">https://www.taylorfrancis.com/books/9781032711515</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematics for the Digital Systems Engineer Essentials for Modern Cryptography, Computer Security and Communications Technology. ent://SD_ILS/0/SD_ILS:600431 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Mitchell, Chris J.<br/>Preferred Shelf Number&#160;XX(600431.1)<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394396559</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, R&oslash;ros, Norway, May 12-15, 2025, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:608387 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jager, Tibor. editor. (orcid)0000-0002-3205-7699&#160;Pan, Jiaxin. editor. (orcid)0000-0002-7459-6850&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91829-2">https://doi.org/10.1007/978-3-031-91829-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, R&oslash;ros, Norway, May 12-15, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:608394 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jager, Tibor. editor. (orcid)0000-0002-3205-7699&#160;Pan, Jiaxin. editor. (orcid)0000-0002-7459-6850&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91820-9">https://doi.org/10.1007/978-3-031-91820-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, R&oslash;ros, Norway, May 12-15, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608395 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jager, Tibor. editor. (orcid)0000-0002-3205-7699&#160;Pan, Jiaxin. editor. (orcid)0000-0002-7459-6850&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91823-0">https://doi.org/10.1007/978-3-031-91823-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, R&oslash;ros, Norway, May 12-15, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:608396 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jager, Tibor. editor. (orcid)0000-0002-3205-7699&#160;Pan, Jiaxin. editor. (orcid)0000-0002-7459-6850&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91826-1">https://doi.org/10.1007/978-3-031-91826-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 12th International Workshop, CBCrypto 2024, Zurich, Switzerland, May 25-26, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608603 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Weger, Violetta. editor. (orcid)0000-0001-9186-2885&#160;Deneuville, Jean-Christophe. editor. (orcid)0000-0002-5128-6729&#160;Horlemann, Anna-Lena. editor. (orcid)0000-0003-2685-2343&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90229-1">https://doi.org/10.1007/978-3-031-90229-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606243 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78017-2">https://doi.org/10.1007/978-3-031-78017-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606319 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78011-0">https://doi.org/10.1007/978-3-031-78011-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:606350 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78023-3">https://doi.org/10.1007/978-3-031-78023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography - SAC 2024 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:607627 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Eichlseder, Maria. editor. (orcid)0000-0002-8750-7423&#160;Gambs, S&eacute;bastien. editor. (orcid)0000-0002-7326-7377&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82841-6">https://doi.org/10.1007/978-3-031-82841-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography - SAC 2024 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607628 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Eichlseder, Maria. editor. (orcid)0000-0002-8750-7423&#160;Gambs, S&eacute;bastien. editor. (orcid)0000-0002-7326-7377&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82852-2">https://doi.org/10.1007/978-3-031-82852-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography ent://SD_ILS/0/SD_ILS:609252 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Djordjevic, Ivan B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-88372-9">https://doi.org/10.1007/978-3-031-88372-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Computing, Cyber Security and Cryptography Issues, Technologies, Algorithms, Programming and Strategies ent://SD_ILS/0/SD_ILS:609403 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Goyal, S. B. editor.&#160;Kumar, Vidyapati. editor.&#160;Islam, Sardar M. N. editor. (orcid)0000-0001-9451-7390&#160;Ghai, Deepika. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4948-8">https://doi.org/10.1007/978-981-96-4948-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606283 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boyle, Elette. editor.&#160;Mahmoody, Mohammad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78020-2">https://doi.org/10.1007/978-3-031-78020-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 14th International Conference, SPACE 2024, Kottayam, India, December 14-17, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606493 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Knechtel, Johann. editor.&#160;Chatterjee, Urbi. editor.&#160;Forte, Domenic. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80408-3">https://doi.org/10.1007/978-3-031-80408-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security. FC 2024 International Workshops Voting, DeFI, WTSC, CoDecFin, Willemstad, Cura&ccedil;ao, March 4-8, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:606537 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Budurushi, Jurlind. editor. (orcid)0000-0002-6732-4400&#160;Kulyk, Oksana. editor. (orcid)0000-0003-4218-1658&#160;Allen, Sarah. editor.&#160;Diamandis, Theo. editor. (orcid)0000-0003-0657-5959&#160;Klages-Mundt, Ariah. editor. (orcid)0000-0002-5577-1000<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-69231-4">https://doi.org/10.1007/978-3-031-69231-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 28th International Conference, FC 2024, Willemstad, Cura&ccedil;ao, March 4-8, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:607259 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Clark, Jeremy. editor. (orcid)0000-0002-3533-5965&#160;Shi, Elaine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78679-2">https://doi.org/10.1007/978-3-031-78679-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 28th International Conference, FC 2024, Willemstad, Cura&ccedil;ao, March 4-8, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607341 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Clark, Jeremy. editor. (orcid)0000-0002-3533-5965&#160;Shi, Elaine. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-78676-1">https://doi.org/10.1007/978-3-031-78676-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Generative AI, Cryptography and Predictive Analytics ICGCPA 2024 ent://SD_ILS/0/SD_ILS:607589 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Virmani, Deepali. editor.&#160;Castillo, Oscar. editor.&#160;Balas, Valentina Emilia. editor.&#160;Elngar, Ahmed A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-9132-3">https://doi.org/10.1007/978-981-97-9132-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:607757 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Niederhagen, Ruben. editor.&#160;Saarinen, Markku-Juhani O. editor. (orcid)0000-0002-2555-235X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86602-9">https://doi.org/10.1007/978-3-031-86602-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:607756 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Niederhagen, Ruben. editor.&#160;Saarinen, Markku-Juhani O. editor. (orcid)0000-0002-2555-235X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86599-2">https://doi.org/10.1007/978-3-031-86599-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2025 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, R&oslash;ros, Norway, May 12-15, 2025, Proceedings, Part V ent://SD_ILS/0/SD_ILS:608397 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jager, Tibor. editor. (orcid)0000-0002-3205-7699&#160;Pan, Jiaxin. editor. (orcid)0000-0002-7459-6850&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-91832-2">https://doi.org/10.1007/978-3-031-91832-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608986 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95764-2">https://doi.org/10.1007/978-3-031-95764-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609005 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95767-3">https://doi.org/10.1007/978-3-031-95767-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609039 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fischlin, Marc. editor. (orcid)0000-0003-0597-8297&#160;Moonsamy, Veelasha. editor. (orcid)0000-0001-6296-2182&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-95761-1">https://doi.org/10.1007/978-3-031-95761-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography : algorithms, protocols, and standards for computer security ent://SD_ILS/0/SD_ILS:598914 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Mammeri, Zoubir, author.<br/>Preferred Shelf Number&#160;QA268 .M34 2024<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604086 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61489-7">https://doi.org/10.1007/978-3-031-61489-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 27th International Conference, FC 2023, Bol, Bra&#269;, Croatia, May 1-5, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602067 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baldimtsi, Foteini. editor.&#160;Cachin, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47751-5">https://doi.org/10.1007/978-3-031-47751-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 27th International Conference, FC 2023, Bol, Bra&#269;, Croatia, May 1-5, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602068 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baldimtsi, Foteini. editor.&#160;Cachin, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47754-6">https://doi.org/10.1007/978-3-031-47754-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602089 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Quaglia, Elizabeth A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47818-5">https://doi.org/10.1007/978-3-031-47818-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 13th International Conference, SPACE 2023, Roorkee, India, December 14-17, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602299 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Regazzoni, Francesco. editor.&#160;Mazumdar, Bodhisatwa. editor. (orcid)0000-0003-1883-4639&#160;Parameswaran, Sri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51583-5">https://doi.org/10.1007/978-3-031-51583-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography - SAC 2023 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602602 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Carlet, Claude. editor.&#160;Mandal, Kalikinkar. editor.&#160;Rijmen, Vincent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53368-6">https://doi.org/10.1007/978-3-031-53368-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602721 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;P&ouml;pper, Christina. editor.&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54773-7">https://doi.org/10.1007/978-3-031-54773-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24-26, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:603520 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Smith, Benjamin. editor. (orcid)0000-0002-6701-1420&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-58411-4">https://doi.org/10.1007/978-3-031-58411-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:603891 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Saarinen, Markku-Juhani. editor. (orcid)0000-0002-2555-235X&#160;Smith-Tone, Daniel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62746-0">https://doi.org/10.1007/978-3-031-62746-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:603901 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Saarinen, Markku-Juhani. editor. (orcid)0000-0002-2555-235X&#160;Smith-Tone, Daniel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62743-9">https://doi.org/10.1007/978-3-031-62743-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604032 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61486-6">https://doi.org/10.1007/978-3-031-61486-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security. FC 2023 International Workshops Voting, CoDecFin, DeFi, WTSC, Bol, Bra&#269;, Croatia, May 5, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602924 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Essex, Aleksander. editor.&#160;Matsuo, Shin'ichiro. editor.&#160;Kulyk, Oksana. editor. (orcid)0000-0003-4218-1658&#160;Gudgeon, Lewis. editor.&#160;Klages-Mundt, Ariah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48806-1">https://doi.org/10.1007/978-3-031-48806-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:603234 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tang, Qiang. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57718-5">https://doi.org/10.1007/978-3-031-57718-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:603237 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tang, Qiang. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57722-2">https://doi.org/10.1007/978-3-031-57722-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:603238 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tang, Qiang. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57725-3">https://doi.org/10.1007/978-3-031-57725-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2024 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:603239 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tang, Qiang. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57728-4">https://doi.org/10.1007/978-3-031-57728-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605093 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71070-4">https://doi.org/10.1007/978-3-031-71070-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605094 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Galdi, Clemente. editor. (orcid)0000-0002-2988-700X&#160;Phan, Duong Hieu. editor. (orcid)0000-0003-1136-4064&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71073-5">https://doi.org/10.1007/978-3-031-71073-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:602730 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;P&ouml;pper, Christina. editor.&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54776-8">https://doi.org/10.1007/978-3-031-54776-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602753 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;P&ouml;pper, Christina. editor.&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54770-6">https://doi.org/10.1007/978-3-031-54770-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms ent://SD_ILS/0/SD_ILS:603566 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;G&uuml;neysu, Tim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-69007-9">https://doi.org/10.1007/978-3-662-69007-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521065 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Johansson, Thomas. editor.&#160;Smith-Tone, Daniel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-40003-2">https://doi.org/10.1007/978-3-031-40003-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homomorphic Encryption for Financial Cryptography Recent Inventions and Challenges ent://SD_ILS/0/SD_ILS:520438 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Seethalakshmi, V. editor.&#160;Dhanaraj, Rajesh Kumar. editor.&#160;Suganyadevi, S. editor.&#160;Ouaissa, Mariya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-35535-6">https://doi.org/10.1007/978-3-031-35535-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520852 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boldyreva, Alexandra. editor.&#160;Kolesnikov, Vladimir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31368-4">https://doi.org/10.1007/978-3-031-31368-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2023 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:520853 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boldyreva, Alexandra. editor.&#160;Kolesnikov, Vladimir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31371-4">https://doi.org/10.1007/978-3-031-31371-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521084 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tibouchi, Mehdi. editor.&#160;Wang, XiaoFeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33491-7">https://doi.org/10.1007/978-3-031-33491-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 10th International Workshop, CBCrypto 2022, Trondheim, Norway, May 29-30, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:520916 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Deneuville, Jean-Christophe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-29689-5">https://doi.org/10.1007/978-3-031-29689-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:521266 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Esser, Andre. editor.&#160;Santini, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46495-9">https://doi.org/10.1007/978-3-031-46495-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part III ent://SD_ILS/0/SD_ILS:521349 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48621-0">https://doi.org/10.1007/978-3-031-48621-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:521350 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48624-1">https://doi.org/10.1007/978-3-031-48624-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:520950 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tibouchi, Mehdi. editor.&#160;Wang, XiaoFeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-33488-7">https://doi.org/10.1007/978-3-031-33488-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:521347 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48615-9">https://doi.org/10.1007/978-3-031-48615-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:521348 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Rothblum, Guy. editor.&#160;Wee, Hoeteck. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-48618-0">https://doi.org/10.1007/978-3-031-48618-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security. FC 2022 International Workshops CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:521301 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Matsuo, Shin'ichiro. editor.&#160;Gudgeon, Lewis. editor.&#160;Klages-Mundt, Ariah. editor.&#160;Perez Hernandez, Daniel. editor.&#160;Werner, Sam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-32415-4">https://doi.org/10.1007/978-3-031-32415-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&amp;P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings ent://SD_ILS/0/SD_ILS:521216 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Zhou, Jianying. editor. (orcid)&#160;Batina, Lejla. editor.&#160;Li, Zengpeng. editor.&#160;Lin, Jingqiang. editor.&#160;Losiouk, Eleonora. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41181-6">https://doi.org/10.1007/978-3-031-41181-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography ent://SD_ILS/0/SD_ILS:587827 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Pal, Om, editor.&#160;Kumar, Vinod (Professor of electronics and communication), editor.&#160;Khan, Rijwan, 1981- editor.&#160;Alam, Bashir, editor.&#160;Alam, Mansaf, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003267812">https://www.taylorfrancis.com/books/9781003267812</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HANDBOOK OF FORMAL ANALYSIS AND VERIFICATION IN CRYPTOGRAPHY ent://SD_ILS/0/SD_ILS:552799 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Akleylek, Sedat.&#160;Dundua, Besik.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003090052">https://www.taylorfrancis.com/books/9781003090052</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in applications of computational intelligence and the Internet of Things (IoT) : cryptography and network security in IoTs ent://SD_ILS/0/SD_ILS:577899 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Chowdhury, Rajdeep, editor.&#160;Niranjan, S. K., editor.<br/>Preferred Shelf Number&#160;TK5105.8857<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003127482">https://www.taylorfrancis.com/books/9781003127482</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Holistic approach to quantum cryptography in cyber security ent://SD_ILS/0/SD_ILS:578140 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Shashi Bhushan, 1928- editor.<br/>Preferred Shelf Number&#160;QA76.9 .D335<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003296034">https://www.taylorfrancis.com/books/9781003296034</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto ent://SD_ILS/0/SD_ILS:595556 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Grimes, Roger A., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483504 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146&#160;Gauthier-Uma&ntilde;a, Val&eacute;rie. editor. (orcid)0000-0003-0909-7091&#160;Ochoa, Mart&iacute;n. editor. (orcid)0000-0002-7816-5775&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483608 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Albrecht, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura&ccedil;ao, March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484585 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Zohar, Aviv. editor.&#160;Eyal, Ittay. editor.&#160;Teague, Vanessa. editor. (orcid)0000-0003-2648-2565&#160;Clark, Jeremy. editor.&#160;Bracciali, Andrea. editor. (orcid)0000-0003-1451-9260<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58820-8">https://doi.org/10.1007/978-3-662-58820-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485010 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127&#160;Mendelson, Avi. editor.&#160;Nandi, Mridul. editor. (orcid)0000-0002-1029-6576&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486060 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1&ndash;5, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483128 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hofheinz, Dennis. editor.&#160;Rosen, Alon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483055 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8&ndash;10, 2019 Revised Selected Papers ent://SD_ILS/0/SD_ILS:483295 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ding, Jintai. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2018 25th International Conference, Calgary, AB, Canada, August 15&ndash;17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483366 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cid, Carlos. editor. (orcid)0000-0001-5761-8694&#160;Jacobson Jr., Michael J. editor. (orcid)0000-0002-4906-0544&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18&ndash;22, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486319 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Goldberg, Ian. editor.&#160;Moore, Tyler. editor. (orcid)0000-0002-8771-8191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486955 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18&ndash;19, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486426 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X&#160;Santini, Paolo. editor. (orcid)0000-0003-0631-3668&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399450 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dinur, Itai. editor.&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 11th International Conference, SCN 2018, Amalfi, Italy, September 5&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399614 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Catalano, Dario. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98113-0">https://doi.org/10.1007/978-3-319-98113-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400334 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms ent://SD_ILS/0/SD_ILS:400424 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dooley, John F. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-90443-6">https://doi.org/10.1007/978-3-319-90443-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:401426 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76578-5">https://doi.org/10.1007/978-3-319-76578-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400566 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Beimel, Amos. editor.&#160;Dziembowski, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401487 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Preneel, Bart. editor. (orcid)0000-0003-2005-9651&#160;Vercauteren, Frederik. editor. (orcid)0000-0002-7208-9599&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:401558 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wakayama, Masato. editor.&#160;Tanaka, Keisuke. editor.&#160;Kunihiro, Noboru. editor.&#160;Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2018 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:401823 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76581-5">https://doi.org/10.1007/978-3-319-76581-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography &ndash; SAC 2017 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402041 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Adams, Carlisle. editor.&#160;Camenisch, Jan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72565-9">https://doi.org/10.1007/978-3-319-72565-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399578 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lange, Tanja. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79063-3">https://doi.org/10.1007/978-3-319-79063-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399906 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983&#160;Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026&#160;Yarom, Yuval. editor. (orcid)0000-0003-0401-4197&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 22nd International Conference, FC 2018, Nieuwpoort, Cura&ccedil;ao, February 26 &ndash; March 2, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399957 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Meiklejohn, Sarah. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-58387-6">https://doi.org/10.1007/978-3-662-58387-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fault Tolerant Architectures for Cryptography and Hardware Security ent://SD_ILS/0/SD_ILS:400923 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;PATRANABIS, SIKHAR. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1387-4">https://doi.org/10.1007/978-981-10-1387-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612659 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;O'Neill, M&aacute;ire. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71045-7">https://doi.org/10.1007/978-3-319-71045-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612685 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Grossklags, Jens. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613304 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kalai, Yael. editor.&#160;Reyzin, Leonid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:613305 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kalai, Yael. editor.&#160;Reyzin, Leonid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70503-3">https://doi.org/10.1007/978-3-319-70503-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611852 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ali, Sk Subidh. editor.&#160;Danger, Jean-Luc. editor.&#160;Eisenbarth, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613097 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor. (orcid)0000-0001-5771-4977&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography - SAC 2016 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613146 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Avanzi, Roberto. editor.&#160;Heys, Howard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69453-5">https://doi.org/10.1007/978-3-319-69453-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:613150 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Brenner, Michael. editor.&#160;Rohloff, Kurt. editor.&#160;Bonneau, Joseph. editor.&#160;Miller, Andrew. editor.&#160;Ryan, Peter Y.A. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616072 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lange, Tanja. editor.&#160;Takagi, Tsuyoshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59879-6">https://doi.org/10.1007/978-3-319-59879-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:610861 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kiayias, Aggelos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70972-7">https://doi.org/10.1007/978-3-319-70972-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616018 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Gollmann, Dieter. editor.&#160;Miyaji, Atsuko. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616876 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bogdanov, Andrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-55714-4">https://doi.org/10.1007/978-3-319-55714-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:616142 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fehr, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54365-8">https://doi.org/10.1007/978-3-662-54365-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2017 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616562 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fehr, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54388-7">https://doi.org/10.1007/978-3-662-54388-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:613502 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Carlet, Claude. editor. (orcid)0000-0002-6118-7927&#160;Hasan, M. Anwar. editor.&#160;Saraswat, Vishal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49445-6">https://doi.org/10.1007/978-3-319-49445-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:616165 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kushilevitz, Eyal. editor.&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616169 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Zikas, Vassilis. editor.&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:613859 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hirt, Martin. editor.&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615988 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cheng, Chen-Mou. editor.&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Persiano, Giuseppe. editor. (orcid)0000-0001-6579-4807&#160;Yang, Bo-Yin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:615946 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Hirt, Martin. editor.&#160;Smith, Adam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography - PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:616080 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cheng, Chen-Mou. editor.&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Persiano, Giuseppe. editor. (orcid)0000-0001-6579-4807&#160;Yang, Bo-Yin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616119 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Clark, Jeremy. editor.&#160;Meiklejohn, Sarah. editor.&#160;Ryan, Peter Y.A. editor.&#160;Wallach, Dan. editor.&#160;Brenner, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616265 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Takagi, Tsuyoshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618047 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dunkelman, Orr. editor.&#160;Keliher, Liam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612277 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;G&uuml;neysu, Tim. editor.&#160;Leander, Gregor. editor. (orcid)0000-0002-2579-8587&#160;Moradi, Amir. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612821 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Pasalic, Enes. editor.&#160;Knudsen, Lars R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615927 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kushilevitz, Eyal. editor.&#160;Malkin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:618448 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Manulis, Mark. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;Schneider, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518872 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ors, Berna. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21356-9">https://doi.org/10.1007/978-3-319-21356-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:518897 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Groth, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27239-9">https://doi.org/10.1007/978-3-319-27239-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:518908 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Okamoto, Tatsuaki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47854-7">https://doi.org/10.1007/978-3-662-47854-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:518462 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-23473-1">https://doi.org/10.1007/978-3-319-23473-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:518982 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dodis, Yevgeniy. editor.&#160;Nielsen, Jesper Buus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46494-6">https://doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:519027 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dodis, Yevgeniy. editor.&#160;Nielsen, Jesper Buus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46497-7">https://doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519217 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Brenner, Michael. editor.&#160;Christin, Nicolas. editor.&#160;Johnson, Benjamin. editor.&#160;Rohloff, Kurt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48051-9">https://doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Timing Channels in Cryptography A Micro-Architectural Perspective ent://SD_ILS/0/SD_ILS:529640 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Rebeiro, Chester. author.&#160;Mukhopadhyay, Debdeep. author.&#160;Bhattacharya, Sarani. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12370-7">https://doi.org/10.1007/978-3-319-12370-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519095 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Malkin, Tal. editor.&#160;Kolesnikov, Vladimir. editor.&#160;Lewko, Allison. editor.&#160;Polychronakis, Michalis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28166-7">https://doi.org/10.1007/978-3-319-28166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519134 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Katz, Jonathan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46447-2">https://doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:519305 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Eisenbarth, Thomas. editor.&#160;&Ouml;zt&uuml;rk, Erdin&ccedil;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16363-5">https://doi.org/10.1007/978-3-319-16363-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:519308 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Schwabe, Peter. editor.&#160;Solworth, Jon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24126-5">https://doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Visual Cryptography for Image Processing and Security Theory, Methods, and Applications ent://SD_ILS/0/SD_ILS:487455 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Liu, Feng. author.&#160;Yan, Wei Qi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09644-5">https://doi.org/10.1007/978-3-319-09644-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489063 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bacon, Dave. editor.&#160;Martin-Delgado, Miguel. editor.&#160;Roetteler, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54429-3">https://doi.org/10.1007/978-3-642-54429-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise ent://SD_ILS/0/SD_ILS:488308 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Pape, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334242 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335076 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Gierlichs, Benedikt. editor.&#160;Guilley, Sylvain. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335076.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334022 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Iwama, Kazuo. editor.&#160;Kawano, Yasuhito. editor.&#160;Murao, Mio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:335154 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fischlin, Marc. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335154.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335099.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Lightweight Cryptography for Security and Privacy Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334938 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Avoine, Gildas. editor.&#160;Kara, Orhun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334938.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40392-7">http://dx.doi.org/10.1007/978-3-642-40392-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for wireless sensor networks using identity-based cryptography ent://SD_ILS/0/SD_ILS:544612 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Patil, Harsh Kupwade., author.&#160;Szygenda, Stephen A.<br/>Preferred Shelf Number&#160;QA76.9 .A25 P38 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439869024">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196562 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28914-9">http://dx.doi.org/10.1007/978-3-642-28914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197053 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bao, Feng. editor.&#160;Samarati, Pierangela. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31284-7">http://dx.doi.org/10.1007/978-3-642-31284-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197516 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bogdanov, Andrey. editor.&#160;Sanadhya, Somitra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34416-9">http://dx.doi.org/10.1007/978-3-642-34416-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197536 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Blyth, Jim. editor.&#160;Dietrich, Sven. editor.&#160;Camp, L. Jean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34638-5">http://dx.doi.org/10.1007/978-3-642-34638-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196237 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Danezis, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27576-0">http://dx.doi.org/10.1007/978-3-642-27576-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196459 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Miri, Ali. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28496-0">http://dx.doi.org/10.1007/978-3-642-28496-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196791 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Danezis, George. editor.&#160;Dietrich, Sven. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-29889-9">http://dx.doi.org/10.1007/978-3-642-29889-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194024 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Catalano, Dario. editor.&#160;Fazio, Nelly. editor.&#160;Gennaro, Rosario. editor.&#160;Nicolosi, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194086 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Ishai, Yuval. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19571-6">http://dx.doi.org/10.1007/978-3-642-19571-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194087 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Biryukov, Alex. editor.&#160;Gong, Guang. editor.&#160;Stinson, Douglas R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19574-7">http://dx.doi.org/10.1007/978-3-642-19574-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman ent://SD_ILS/0/SD_ILS:195100 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Goldreich, Oded. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195967 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Chen, Liqun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193796 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dam, Wim. editor.&#160;Kendon, Vivien M. editor.&#160;Severini, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Nonlinear laser dynamics from quantum dots to cryptography ent://SD_ILS/0/SD_ILS:306141 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;L&uuml;dge, Kathy.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9783527639823">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings ent://SD_ILS/0/SD_ILS:191801 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Micciancio, Daniele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11799-2">http://dx.doi.org/10.1007/978-3-642-11799-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192157 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sendrier, Nicolas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-12929-2">http://dx.doi.org/10.1007/978-3-642-12929-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192187 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Nguyen, Phong Q. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192838 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sion, Radu. editor.&#160;Curtmola, Reza. editor.&#160;Dietrich, Sven. editor.&#160;Kiayias, Aggelos. editor.&#160;Miret, Josep M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Cryptography A Textbook for Students and Practitioners ent://SD_ILS/0/SD_ILS:190836 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Paar, Christof. author.&#160;Pelzl, Jan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04101-3">http://dx.doi.org/10.1007/978-3-642-04101-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Chaos synchronization and cryptography for secure communications applications for encryption ent://SD_ILS/0/SD_ILS:277940 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Banerjee, Santo, 1976-&#160;IGI Global.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=310459</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quantum Information, Computation and Cryptography An Introductory Survey of Theory, Technology and Experiments ent://SD_ILS/0/SD_ILS:191835 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Benatti, Fabio. editor.&#160;Fannes, Mark. editor.&#160;Floreanini, Roberto. editor.&#160;Petritis, Dimitri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11914-9">http://dx.doi.org/10.1007/978-3-642-11914-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192701 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Sion, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14577-3">http://dx.doi.org/10.1007/978-3-642-14577-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192932 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Garay, Juan A. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15317-4">http://dx.doi.org/10.1007/978-3-642-15317-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory in Science and Communication With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity ent://SD_ILS/0/SD_ILS:188668 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Schroeder, Manfred. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85298-8">http://dx.doi.org/10.1007/978-3-540-85298-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189693 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Reingold, Omer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2009 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189697 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jarecki, Stanis&#322;aw. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00468-1">http://dx.doi.org/10.1007/978-3-642-00468-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:190657 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dingledine, Roger. editor.&#160;Golle, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03549-4">http://dx.doi.org/10.1007/978-3-642-03549-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190581 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Shacham, Hovav. editor.&#160;Waters, Brent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo, Canada, May 11-13, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191450 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Childs, Andrew. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10698-9">http://dx.doi.org/10.1007/978-3-642-10698-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Codes: An Introduction to Information Communication and Cryptography ent://SD_ILS/0/SD_ILS:175791 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Biggs, N.L. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84800-273-9">http://dx.doi.org/10.1007/978-1-84800-273-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting ent://SD_ILS/0/SD_ILS:186333 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cole, Peter H. editor.&#160;Ranasinghe, Damith C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71641-9">http://dx.doi.org/10.1007/978-3-540-71641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2008 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188130 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Cramer, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78440-1">http://dx.doi.org/10.1007/978-3-540-78440-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188716 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Galbraith, Steven D. editor.&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:188645 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85230-8">http://dx.doi.org/10.1007/978-3-540-85230-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189241 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Kawano, Yasuhito. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings ent://SD_ILS/0/SD_ILS:189044 2026-03-21T21:10:38Z 2026-03-21T21:10:38Z Author&#160;Buchmann, Johannes. editor.&#160;Ding, Jintai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>