Arama Sonu&ccedil;lar&#305; Data encryption (Computer science) - Daralt&#305;lm&#305;&#351;: Cryptography. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300? 2026-01-18T12:05:06Z Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1124950 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptography protocols, design and applications ent://SD_ILS/0/SD_ILS:1060749 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum cryptography potentially perfect security. ent://SD_ILS/0/SD_ILS:1092020 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> New directions of modern cryptography ent://SD_ILS/0/SD_ILS:1011894 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Hashing in computer science fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:964869 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Security secrets, intruders and ID tags. ent://SD_ILS/0/SD_ILS:1092043 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Guide to pairing-based cryptography ent://SD_ILS/0/SD_ILS:1140799 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Quantum cryptography and computing theory and implementation ent://SD_ILS/0/SD_ILS:1057662 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format:&#160;Elektronik Kaynak<br/> Cryptographic Boolean functions and applications ent://SD_ILS/0/SD_ILS:1193238 2026-01-18T12:05:06Z 2026-01-18T12:05:06Z by&#160;Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format:&#160;Elektronik Kaynak<br/>