Search Results for Data Encryption. - Narrowed by: Cryptographie.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bEncryption.$0026qf$003dSUBJECT$002509Subject$002509Cryptographie.$002509Cryptographie.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2026-01-23T20:41:45Z
Becoming quantum safe protect your business and mitigate risks with post-quantum cryptography and crypto-agility
ent://SD_ILS/0/SD_ILS:600179
2026-01-23T20:41:45Z
2026-01-23T20:41:45Z
Author Arun, Jai Singh, author. Harishankar, Ray, author. Rjaibi, Walid, author. Diffie, Whitfield, writer of foreword.<br/>Preferred Shelf Number QA76.889<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394406784</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded cryptography. 1
ent://SD_ILS/0/SD_ILS:599697
2026-01-23T20:41:45Z
2026-01-23T20:41:45Z
Author Prouff, Emmanuel, editor. Renault, Guenael. Rivain, Mattieu. O'Flynn, Colin.<br/>Preferred Shelf Number QA76.9 .A25 E43 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351879</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-01-23T20:41:45Z
2026-01-23T20:41:45Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Quantum blockchain : an emerging cryptographic paradigm
ent://SD_ILS/0/SD_ILS:597796
2026-01-23T20:41:45Z
2026-01-23T20:41:45Z
Author Dhanaraj, Rajesh Kumar, editor.<br/>Preferred Shelf Number QA76.9 .B56<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119836728</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Asymmetric cryptography : primitives and protocols
ent://SD_ILS/0/SD_ILS:598096
2026-01-23T20:41:45Z
2026-01-23T20:41:45Z
Author Pointcheval, David, editor.<br/>Preferred Shelf Number QA76.9 .A25 A83 2022<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394188369</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto
ent://SD_ILS/0/SD_ILS:595556
2026-01-23T20:41:45Z
2026-01-23T20:41:45Z
Author Grimes, Roger A., author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119618232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>