-
261
-
262Published 1994
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
263
-
264
-
265by Bellare, Mihir, 1962-
Published 1996
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
266by Easttom, ChuckTable of Contents: “...Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800...”
Published 2021
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
267Published 2019
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Electronic Book -
268by Schneier, Bruce, 1963-Subjects: “...Cryptography...”
Published 1996
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
269Published 2019Table of Contents: “...-Quantum Cryptography -- Composable and Finite Computational Security of Quantum Message Transmission...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Electronic Conference Proceeding Book -
270by Grimes, Roger A.Subjects: “...Cryptography...”
Published 2020
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
271
-
272by Murphy, M. MaureenSubjects: “...Cryptography United States https://id.loc.gov/authorities/names/n78095330-781...”
Published 1996
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
273Published 2021
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
274Published 2021Table of Contents: “...-One Barrier -- References -- Disappearing Cryptography in the Bounded Storage Model -- 1 Introduction...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
275
-
276Published 2022Table of Contents: “...Post-quantum cryptography -- Interactive proofs -- Quantum cryptography -- Secret-sharing...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
277
-
278Published 2013Subjects: “...Cryptography...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
279Published 2006
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book -
280Published 2006Table of Contents: “... Cryptography -- Finding Good Differential Patterns for Attacks on SHA-1 -- Extending Gibson's Attacks...”
This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.Book