Shortcuts
SISSA Library . Default .
PageMenu- Main Menu-
Page content
 

Search Results

Your Search for DATA ENCRYPTION COMPUTER SCIENCE returned 34 Items

Search Result Page: .   1   .   . Page: 1 of 1
SELECT THE TITLE TO ACCESS THE AVAILABILITY INFORMATION
Display results in shelf format.
Search Results
Result Thumbnail Title Author Year Flags Holding Information
1 Binary Quadratic Forms: An Algorithmic Approach Binary Quadratic Forms: An Algorithmic Approach [Ebook]   2007 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Springer.
2 Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory [Ebook]   2000 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
3 Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness [Ebook]   2003 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Birkhäuser.
4 Cryptography and Computational Number Theory Cryptography and Computational Number Theory [Ebook]   2001 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
5 Finite Fields and Applications: Proceedings of The Fifth International Conference on Finite Fields and Applications F q 5, held at the University of Augsburg, Germany, August 2–6, 1999 / Finite Fields and Applications: Proceedings of The Fifth International Conference on Finite Fields and Applications F q 5, held at the University of Augsburg, Germany, August 2–6, 1999 / [Ebook]   2001 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
6 Finite Fields with Applications to Coding Theory, Cryptography and Related Areas: Proceedings of the Sixth International Conference on Finite Fields and Applications, held at Oaxaca, México, May 21–25, 2001 / Finite Fields with Applications to Coding Theory, Cryptography and Related Areas: Proceedings of the Sixth International Conference on Finite Fields and Applications, held at Oaxaca, México, May 21–25, 2001 / [Ebook]   2002 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
7 Mathematical Analysis II: Optimisation, Differential Equations and Graph Theory: ICRAPAM 2018, New Delhi, India, October 23-25 Mathematical Analysis II: Optimisation, Differential Equations and Graph Theory: ICRAPAM 2018, New Delhi, India, October 23-25 [Ebook]   2020 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
8 Non-Associative Algebras and Related Topics: NAART II, Coimbra, Portugal, July 18–22, 2022 / Non-Associative Algebras and Related Topics: NAART II, Coimbra, Portugal, July 18–22, 2022 / [Ebook]   2023 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
9 Number Theory I: Fundamental Problems, Ideas and Theories Number Theory I: Fundamental Problems, Ideas and Theories [Ebook]   1995 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
10 Protecting Privacy through Homomorphic Encryption Protecting Privacy through Homomorphic Encryption [Ebook]   2021 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
11 Selected Areas in Cryptography Selected Areas in Cryptography [Ebook]   1997 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
12 Topics in Geometry, Coding Theory and Cryptography Topics in Geometry, Coding Theory and Cryptography [Ebook]   2007 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Springer.
13 Post-Quantum Cryptography Post-Quantum Cryptography [Ebook] Bernstein, Daniel J. 2009 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Springer.
14 La guerra dei codici: spie e linguaggi cifrati nella seconda guerra mondiale La guerra dei codici: spie e linguaggi cifrati nella seconda guerra mondiale [Monograph ]
Series:Saggi
Budiansky, Stephen 2002 Monograph Shelf Location: 001 BUD.
Collections: General.
Number of Holdings: 1.
15 Cryptology and Error Correction: An Algebraic Introduction and Real-World Applications Cryptology and Error Correction: An Algebraic Introduction and Real-World Applications [Ebook] Childs, Lindsay N. 2019 Ebook URL Exists Catalogue Record Shelf Location: Online Resource: Springer..
16 Lattices Applied to Coding for Reliable and Secure Communications Lattices Applied to Coding for Reliable and Secure Communications [Ebook] Costa, Sueli I.R. 2017 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
17 Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation [Ebook] Díaz Cardell, Sara 2019 Ebook URL Exists Catalogue Record Shelf Location: Online Resource: Springer..
18 Modern Cryptography, Probabilistic Proofs and Pseudorandomness Modern Cryptography, Probabilistic Proofs and Pseudorandomness [Ebook] Goldreich, Oded 1999 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
19 Algebraic Geometry for Coding Theory and Cryptography: IPAM, Los Angeles, CA, February 2016 Algebraic Geometry for Coding Theory and Cryptography: IPAM, Los Angeles, CA, February 2016 [Ebook] Howe, Everett W. 2017 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
20 Black-Box Models of Computation in Cryptology Black-Box Models of Computation in Cryptology [Ebook] Jager, Tibor 2012 Ebook URL Exists Catalogue Record Shelf Location: Online Resource: Vieweg+Teubner.
21 Group Theory Group Theory [Ebook] Khattar, Dinesh 2023 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
22 Algebraic Aspects of Cryptography Algebraic Aspects of Cryptography [Ebook] Koblitz, Neal. 1948- 1998 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
23 Random Curves: Journeys of a Mathematician Random Curves: Journeys of a Mathematician [Ebook] Koblitz, Neal. 1948- 2008 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Springer.
24 Introduction to Modern Number Theory: Fundamental Problems, Ideas and Theories Introduction to Modern Number Theory: Fundamental Problems, Ideas and Theories [Ebook] Manin, Yuri Ivanovich 2005 Ebook URL Exists Catalogue Record Shelf Location: Online Resource: Springer.
25 Well Packed – Not a Bit Too Much: Compression of Digital Data Explained in an Understandable Way / Well Packed – Not a Bit Too Much: Compression of Digital Data Explained in an Understandable Way / [Ebook] Manz, Olaf 2021 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
26 Everyday cryptography: fundamental principles and applications Everyday cryptography: fundamental principles and applications [Ebook] Martin, Keith M. 2017 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Oxford Scholarship Online.
27 Everyday cryptography: fundamental principles and applications / Everyday cryptography: fundamental principles and applications / [Ebook] Martin, Keith M. 2012 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Oxford Scholarship Online.
28 Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography / Foundations of Logic and Mathematics: Applications to Computer Science and Cryptography / [Ebook] Nievergelt, Yves 2002 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
29 Prime Numbers and Computer Methods for Factorization Prime Numbers and Computer Methods for Factorization [Ebook] Riesel, Hans. 1929- 2012 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Birkhäuser.
30 Gröbner Bases, Coding, and Cryptography Gröbner Bases, Coding, and Cryptography [Ebook] Sala, Massimiliano 2009 Ebook URL Exists Catalogue Record Shelf Location: Online Resource Springer.
31 Quantum Algorithms for Cryptographically Significant Boolean Functions: An IBMQ Experience / Quantum Algorithms for Cryptographically Significant Boolean Functions: An IBMQ Experience / [Ebook] SAPV, Tharrmashastha 2021 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Springer.
32 Number Theoretic Methods in Cryptography: Complexity lower bounds Number Theoretic Methods in Cryptography: Complexity lower bounds [Ebook] Shparlinski, Igor E. 1999 Ebook URL Exists Catalogue Record Shelf Location: Online resource: Birkhäuser.
33 An Introduction to Mathematical Cryptography An Introduction to Mathematical Cryptography [Ebook] Silverman, Joseph H. 1955- 2008 Ebook URL Exists Catalogue Record Shelf Location: Online Resource : Springer.
34 Codici & segreti Codici & segreti [Monograph ] Singh, Simon 1999 Monograph Shelf Location: 001 SIN.
Collections: General.
Number of Holdings: 1.
Search Result Page: .   1   .   . Page: 1 of 1
SELECT THE TITLE TO ACCESS THE AVAILABILITY INFORMATION

Quick Search