//]]>
Fault Analysis in Cryptography by Joye, Marc. Publication: . XVI, 354 p. 98 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Block Cipher Companion by Knudsen, Lars R. Publication: . XIV, 270 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Hardware-Intrinsic Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Locally Decodable Codes and Private Information Retrieval Schemes by Yekhanin, Sergey. Publication: . XII, 82 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Statistical Steganalysis by Böhme, Rainer. Publication: . XVI, 288 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Secure Two-Party Protocols by Hazay, Carmit. Publication: . XIII, 263 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The LLL Algorithm by Nguyen, Phong Q. Publication: . XIV, 496 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Practical Signcryption by Dent, Alexander W. Publication: . XVIII, 274 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Operational Semantics and Verification of Security Protocols by Cremers, Cas. Publication: . XIII, 172 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية