Search Results for Computer science. - Narrowed by: Cryptography.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list2026-04-09T09:35:33ZHashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-04-09T09:35:33Z2026-04-09T09:35:33Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Electronic Resources<br/>Physics and theoretical computer science from numbers and languages to (quantum) cryptography securityent://SD_ILS/0/SD_ILS:9406992026-04-09T09:35:33Z2026-04-09T09:35:33Zby Gazeau, Jean-Pierre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305174">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11249502026-04-09T09:35:33Z2026-04-09T09:35:33Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format: Electronic Resources<br/>Cryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-04-09T09:35:33Z2026-04-09T09:35:33Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Electronic Resources<br/>Quantum cryptography potentially perfect security.ent://SD_ILS/0/SD_ILS:10920202026-04-09T09:35:33Z2026-04-09T09:35:33Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format: Electronic Resources<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-04-09T09:35:33Z2026-04-09T09:35:33Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Electronic Resources<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-04-09T09:35:33Z2026-04-09T09:35:33Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Electronic Resources<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:11407992026-04-09T09:35:33Z2026-04-09T09:35:33Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format: Electronic Resources<br/>Quantum cryptography and computing theory and implementationent://SD_ILS/0/SD_ILS:10576622026-04-09T09:35:33Z2026-04-09T09:35:33Zby Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format: Electronic Resources<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11932382026-04-09T09:35:33Z2026-04-09T09:35:33Zby Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Electronic Resources<br/>The history of information security : a comprehensive handbookent://SD_ILS/0/SD_ILS:11865232026-04-09T09:35:33Z2026-04-09T09:35:33Zby Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format: Electronic Resources<br/>