Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Cryptanalysis and other attacks
Symmetric cryptography and hash functions and Mathematical foundations of cryptography
Embedded systems security and Security in hardware
Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

Browse Subjects

Show more subjects...

Statistics

from
to
Export