000774699 000__ 01668cam\a2200409\i\4500 000774699 001__ 774699 000774699 005__ 20210515124229.0 000774699 006__ m\\\\\o\\d\\\\\\\\ 000774699 007__ cr\cn\nnnunnun 000774699 008__ 151106t20152015si\a\\\\ob\\\\001\0\eng\d 000774699 020__ $$z9781118660010 000774699 020__ $$a9781118660041$$q(electronic book) 000774699 035__ $$a(MiAaPQ)ebr11111661 000774699 040__ $$aMiAaPQ$$beng$$erda$$epn$$cMiAaPQ$$dMiAaPQ 000774699 050_4 $$aQA76.9.A25$$b.S255 2015eb 000774699 08204 $$a005.8/2$$223 000774699 1001_ $$aSakiyama, Kazuo,$$d1971-$$eauthor. 000774699 24510 $$aSecurity of block ciphers :$$bfrom algorithm design to hardware implementation /$$cKazuo Sakiyama, Yu Sasaki, Yang Li. 000774699 264_1 $$aSingapore :$$bWiley,$$c2015. 000774699 264_4 $$c©2015 000774699 300__ $$a1 online resource (369 pages) :$$billustrations 000774699 336__ $$atext$$2rdacontent 000774699 337__ $$acomputer$$2rdamedia 000774699 338__ $$aonline resource$$2rdacarrier 000774699 504__ $$aIncludes bibliographical references and index. 000774699 506__ $$aAccess limited to authorized users. 000774699 588__ $$aDescription based on print version record. 000774699 650_0 $$aComputer security$$xMathematics. 000774699 650_0 $$aData encryption (Computer science) 000774699 650_0 $$aCiphers. 000774699 650_0 $$aComputer algorithms. 000774699 7001_ $$aSasaki, Yu,$$eauthor. 000774699 7001_ $$aLi, Yang,$$d1986-$$eauthor. 000774699 77608 $$iPrint version:$$aSakiyama, Kazuo, 1971-$$tSecurity of block ciphers : from algorithm design to hardware implementation.$$dSingapore : Wiley, c2015 $$z9781118660010 $$w(DLC) 2015019381 000774699 852__ $$bebk 000774699 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=11111661$$zOnline Access 000774699 909CO $$ooai:library.usi.edu:774699$$pGLOBAL_SET 000774699 980__ $$aEBOOK 000774699 980__ $$aBIB 000774699 982__ $$aEbook 000774699 983__ $$aOnline