Torthaí cuardaigh - "Data encryption (Computer science)."
-
1
-
2
-
3
Cryptology transmitted message protection from deterministic chaos up to optical vortices
Foilsithe / Cruthaithe 2016Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
4
Timing channels in cryptography a micro-architectural perspective
Foilsithe / Cruthaithe 2015Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
5
Why cryptography should not rely on physical attack complexity
Foilsithe / Cruthaithe 2015Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
6
The code book the science of secrecy from ancient Egypt to quantum cryptography
Foilsithe / Cruthaithe 2000LEABHAR -
7
-
8
Modern cryptanalysis techniques for advanced code breaking
Foilsithe / Cruthaithe 2008Table of contents only
LEABHAR -
9
Performance benchmarking of new software stream ciphers for secure multimedia streaming in resource-constrained devices
Foilsithe / Cruthaithe 2010Tráchtas -
10