Search Results for Functions - Narrowed by: Cryptography.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFunctions$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?
2026-02-09T20:18:01Z
Cryptographic Boolean functions and applications
ent://SD_ILS/0/SD_ILS:147530
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Cusick, Thomas W., 1943- Stănică, Pantelimon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Embedded cryptography 2
ent://SD_ILS/0/SD_ILS:599724
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Prouff, Emmanuel, editor. Renault, Guenael, editor. Rivain, Mattieu, editor. O'Flynn, Colin, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394351909</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography : algorithms, protocols, and standards for computer security
ent://SD_ILS/0/SD_ILS:598914
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Mammeri, Zoubir, author.<br/>Preferred Shelf Number QA268 .M34 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
x86 software reverse-engineering, cracking, and counter-measures
ent://SD_ILS/0/SD_ILS:598920
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Domas, Stephanie, author. Domas, Christopher, author.<br/>Preferred Shelf Number QA76.9 .A25 D66 2024<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 1 : Design and security proofs
ent://SD_ILS/0/SD_ILS:598803
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256358</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Symmetric cryptography. Volume 2 : Cryptanalysis and future directions
ent://SD_ILS/0/SD_ILS:598806
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Boura, Christina, editor. Naya-Plasencia, Maria, editor.<br/>Preferred Shelf Number Z104 .S966 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing cryptography using Python
ent://SD_ILS/0/SD_ILS:596198
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Bray, Shannon, 1972-<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Hardware security : design, threats, and safeguards
ent://SD_ILS/0/SD_ILS:543620
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Mukhopadhyay, Debdeep, author. Subhra, Rajat, author.<br/>Preferred Shelf Number QA76.9 .A25 M85 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439895849">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
An introduction to number theory with cryptography
ent://SD_ILS/0/SD_ILS:544089
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Kraft, James S., eauthor. Washington, Lawrence C., author. Taylor and Francis.<br/>Preferred Shelf Number QA241<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482214420">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Algorithmic cryptanalysis
ent://SD_ILS/0/SD_ILS:546057
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Joux, Antoine., author.<br/>Preferred Shelf Number QA76.9 .A43 J693 2009<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420070033">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Elliptic curves : number theory and cryptography
ent://SD_ILS/0/SD_ILS:539008
2026-02-09T20:18:01Z
2026-02-09T20:18:01Z
Author Washington, Lawrence C., author.<br/>Preferred Shelf Number QA567.2 .E44 W37 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420071474">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>