Arama Sonuçları Data encryption (Computer science) - Daraltılmış: Cryptography.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Konu$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?2026-01-18T12:05:06ZCryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11249502026-01-18T12:05:06Z2026-01-18T12:05:06Zby Cusick, Thomas W., author.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=4835216">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptography protocols, design and applicationsent://SD_ILS/0/SD_ILS:10607492026-01-18T12:05:06Z2026-01-18T12:05:06Zby Lek, Kamol.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3021394">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography potentially perfect security.ent://SD_ILS/0/SD_ILS:10920202026-01-18T12:05:06Z2026-01-18T12:05:06Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411424">Click to View</a><br/>Format: Elektronik Kaynak<br/>New directions of modern cryptographyent://SD_ILS/0/SD_ILS:10118942026-01-18T12:05:06Z2026-01-18T12:05:06Zby Cao, Zhenfu.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=1165936">Click to View</a><br/>Format: Elektronik Kaynak<br/>Hashing in computer science fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:9648692026-01-18T12:05:06Z2026-01-18T12:05:06Zby Konheim, Alan G., 1934-<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=537352">Click to View</a><br/>Format: Elektronik Kaynak<br/>Security secrets, intruders and ID tags.ent://SD_ILS/0/SD_ILS:10920432026-01-18T12:05:06Z2026-01-18T12:05:06Zby ProQuest (Firm)<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3411447">Click to View</a><br/>Format: Elektronik Kaynak<br/>Guide to pairing-based cryptographyent://SD_ILS/0/SD_ILS:11407992026-01-18T12:05:06Z2026-01-18T12:05:06Zby El Mrabet, Nadia, editor.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=5475691">Click to View</a><br/>Format: Elektronik Kaynak<br/>Quantum cryptography and computing theory and implementationent://SD_ILS/0/SD_ILS:10576622026-01-18T12:05:06Z2026-01-18T12:05:06Zby Horodecki, Ryszard.<br/><a href="https://ebookcentral.proquest.com/lib/baskent-ebooks/detail.action?docID=3014999">Click to View</a><br/>Format: Elektronik Kaynak<br/>Cryptographic Boolean functions and applicationsent://SD_ILS/0/SD_ILS:11932382026-01-18T12:05:06Z2026-01-18T12:05:06Zby Cusick, Thomas W., 1943-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123748904">http://www.sciencedirect.com/science/book/9780123748904</a><br/>Format: Elektronik Kaynak<br/>