1. Advances in cryptology -- ASIACRYPT 2018 :
Author: Thomas Peyrin, Steven Galbraith (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


2. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011


3. Advances in cryptology - ASIACRYPT 2018: 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2-6, 2018 : proceedings
Author: / Edited by Thomas Peyrin, Steven Galbraith.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Cryptography -- Congresses.,Data encryption (Computer science) -- Congresses.,Cryptography -- Congresses.,Computers -- Access control -- Congresses.,Cryptography.,Data encryption.,Post-Quantum Cryptanalysis.,Encrypted Storage.,Symmetric-Key Constructions.,Lattice Cryptography.,Quantum Symmetric Cryptanalysis.,Zero-Knowledge.,Public Key and Identity-Based Encryption.,Side-Channels. Signatures.,Leakage-Resilient Cryptography.,Multi-party Computation.,ORQM.,Real World Protocols.,Secret Sharing.,Isogeny Cryptography.

4. Advances in cryptology -- EUROCRYPT 2013 :
Author: Thomas Johansson, Phong Q. Nguyen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial Intelligence.,Computer Security.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
T466
2013


5. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011


6. Applied cryptography and network security :
Author: Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung, (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5102
.
94
.
A28
2019


7. Applied cryptography and network security: 16th international conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018: proceeding
Author: / edited by Bart Preneel, Frederik Vercauteren.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Computer networks -- Security measures.,Computer networks.,Data encryption.,Security measures.,Computer science.

8. Code based cryptography :
Author: Marco Baldi, Edoardo Persichetti, Paolo Santini, (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Public key cryptography, Congresses.,Data encryption (Computer science),Public key cryptography.
Classification :
TK5102
.
94
.
C63
2019


9. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Documentation Center (Kerman)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures - Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
2000


10. Financial cryptography and data security :
Author: Radu Sion (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Electronic commerce -- Security measures -- Congresses.,Electronic funds transfers -- Security measures -- Congresses.

11. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


12. Information security and cryptology -- ICISC 2018 :
Author: Kwangsu Lee (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


13. International conference on innovative computing and communications :
Author: edited by Siddhartha Bhattacharyya, Aboul Ella Hassanien, Deepak Gupta, Ashish Khanna, Indrajit Pan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science-- Technological innovations, Congresses.,Information technology-- Technological innovations, Congresses.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology-- Technological innovations.
Classification :
QA75
.
5


14. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017


15. PKG 2003 :-Public key cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses ; Computers ; Access control ; Congresses ; Data encryption (Computer science) ; Congresses ; Public key cryptography ; Congresses ;

16. Post-Quantum Cryptography :
Author: Jintai Ding, Rainer Steinwandt (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Data encryption (Computer science),Quantum computers.
Classification :
QA76
.
9
.
A25


17. Post-quantum cryptography :
Author: Bo-Yin Yang (edition)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
P73
2011


18. Progress in cryptology--AFRICACRYPT 2009 :
Author: Bart Preneel (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie
Classification :
QA76
.
9
.
A25
I58
2009


19. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


20. Public-Key Cryptography – PKC 2015
Author: \ Jonathan Katz (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Public key cryptography -- Congresses.,Data encryption (Computer science),Systems and Data Security.,رمزنگاری کلید عمومی -- کنگره ها,رمزگذاری دادهها
Classification :
QA76
.
9
.
P81
2015
E-Book
,

