-
1
-
2
-
3
-
4
-
5
Recommendation for Cryptographic Key Generation /
Subjects: “…Computer security.…”
Get full text
Government Document Online Book -
6
Crypto : how the code rebels beat the government--saving privacy in the digital age /
Subjects: “…Computer security.…”
Book -
7
-
8
Cryptographic security architecture : design and verification /
Subjects: “…Computer security.…”
Book -
9
A classical introduction to cryptography applications for communications security /
Subjects: “…Computer security.…”
Get full text
Online Book -
10
Chaos-based cryptography theory, algorithms and applications /
Subjects: “…Computer security.…”
Get full text
Online Book -
11
Basics of contemporary cryptography for IT practitioners
Subjects: “…Computer security.…”
Get full text
Online Book -
12
Secret key cryptography : ciphers, from simple to unbreakable /
Subjects: Get full text
Online Audio (Non-Music) -
13
-
14
Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991 /
Subjects: “…Computer security.…”
Book -
15
-
16
Advances in cryptology--EUROCRYPT '94 : Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994 : proceedings /
Subjects: “…Computer security.…”
Conference Proceeding Book -
17
Electromagnetic information leakage and countermeasure technique /
Subjects: “…Computer security.…”
Get full text
Online Book -
18
Data-driven block ciphers for fast telecommunication systems
Subjects: “…Computer security.…”
Get full text
Online Book -
19
Secure multi-party computation
Subjects: “…Computer security Management.…”
Get full text
Online Book -
20
Real-world cryptography /
Subjects: “…Computer security.…”
Get full text
Get full text
Online Video Online Video