Search Results

You searched for: subject "Data encryption (Computer science)" Remove constraint

Search Results

Cover image for Secure multi-party computation

Secure multi-party computation

Location
Access Content Online
Cover image for Cryptography made simple

Cryptography made simple

Joyner Library - General Stacks
Call Number: QA76.9.D35 S63 2016
Cover image for Symmetric cryptographic protocols

Symmetric cryptographic protocols

Joyner Library - General Stacks
Call Number: QA76.9 .A25 R36 2014
Cover image for Cryptography

Cryptography

Joyner Library - General Stacks
Call Number: QA76.9 .A25 M3735 2020
Cover image for Watermarking systems engineering

Watermarking systems engineering

Joyner Library - General Stacks
Call Number: QA76.9.A25 B3792 2004
Cover image for Randomness testing of the advanced encryption standard finalist candidates

Randomness testing of the advanced encryption standard finalist candidates

Joyner Library - Microforms B300
Call Number: C 13.58:6483
Cover image for Applications of secure multiparty computation

Applications of secure multiparty computation

Joyner Library - General Stacks
Call Number: QA76.9 .A25 A65 2015
Cover image for Cryptology

Cryptology

Joyner Library - General Stacks
Call Number: Z103 .B4813 1994
Cover image for Post-quantum cryptography

Post-quantum cryptography

Joyner Library - General Stacks
Call Number: QA76.9.A25 P67 2009