Search Results for Computer science. - Narrowed by: Cryptography. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-09T09:35:33Z Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Physics and theoretical computer science from numbers and languages to (quantum) cryptography security ent://SD_ILS/0/SD_ILS:940699 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Gazeau, Jean-Pierre.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=305174">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1124950 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptography protocols, design and applications ent://SD_ILS/0/SD_ILS:1060749 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Quantum cryptography potentially perfect security. ent://SD_ILS/0/SD_ILS:1092020 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format:&#160;Electronic Resources<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:1011894 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Guide to pairing-based cryptography ent://SD_ILS/0/SD_ILS:1140799 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Quantum cryptography and computing theory and implementation ent://SD_ILS/0/SD_ILS:1057662 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1193238 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format:&#160;Electronic Resources<br/> The history of information security : a comprehensive handbook ent://SD_ILS/0/SD_ILS:1186523 2026-04-09T09:35:33Z 2026-04-09T09:35:33Z by&#160;Leeuw, Karl de.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780444516084">http://www.sciencedirect.com/science/book/9780444516084</a><br/>Format:&#160;Electronic Resources<br/>