1. Advanced DPA theory and practice
Author: Eric Peeters
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Embedded computer systems-- Security measures
Classification :
TK7895
.
E42
P44
2013


2. Advanced statistical steganalysis
Author: / Rainer Bèohme
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Cryptography -- Statistical methods,Digital watermarking,Data encryption (Computer science)
Classification :
Z
104
.
B68
2010


3. Advanced statistical steganalysis
Author: / Rainer Beohme
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science),Cryptography
Classification :
QA76
.
9
.
A25B64
2010


4. Advanced statistical steganalysis /
Author: Rainer Böhme.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B64
2010


5. Advances in Cryptology – EUROCRYPT 2010
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,رمزگذاری دادهها -- کنگرهها,رمزنگاری -- کنگرهها
Classification :
E-Book
,

6. Advances in cryptology
Author: Shai Halevi (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I584
2009


7. Advances in cryptology - ASIACRYPT 2018: 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2-6, 2018 : proceedings
Author: / Edited by Thomas Peyrin, Steven Galbraith.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Cryptography -- Congresses.,Data encryption (Computer science) -- Congresses.,Cryptography -- Congresses.,Computers -- Access control -- Congresses.,Cryptography.,Data encryption.,Post-Quantum Cryptanalysis.,Encrypted Storage.,Symmetric-Key Constructions.,Lattice Cryptography.,Quantum Symmetric Cryptanalysis.,Zero-Knowledge.,Public Key and Identity-Based Encryption.,Side-Channels. Signatures.,Leakage-Resilient Cryptography.,Multi-party Computation.,ORQM.,Real World Protocols.,Secret Sharing.,Isogeny Cryptography.

8. Advances in cryptology - EUROCRYPT 2010
Author: / Henri Gilbert, (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science)--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
E965
,
2010


9. Advances in cryptology: EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31-June 4, 1998: proceedings
Author: EUROCRYPT'89 )8991: Espoo, Finland(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
QA
76
.
9
.
A25
.
E964
1998


10. Advances of DNA computing in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;

11. Algebraic cryptanalysis
Author: Gregory V. Bard
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Cryptography,، Data encryption )Computer science(
Classification :
Z
103
.
B32A4


12. Algebraic cryptanalysis
Author: Bard, Gregory V.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography,، Data encryption )Computer science(
Classification :
Z
103
.
B37
2009


13. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگرهها,رمزگذاری دادهها -- کنگرهها,رمزنگاری -- کنگرهها
Classification :
E-Book
,

14. Applied cryptanalysis : breaking ciphers in the real world
Author: Stamp, Mark
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security. ► Data encryption (Computer science) ► Cryptography.
Classification :
005
.
S783a


15. Applied cryptography and network security
Author: \ Jonathan Katz, Moti Yung (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication-- Security measures-- Congresses.,Data encryption (Computer science)-- Congresses.,Cryptography-- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
TK5102
.
94
.
A28
2007
E-Book
,


16. Applied cryptography and network security
Author: / John Ioannidis, Angelos Keromytis, Moti Yung (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses
Classification :
TK
5102
.
85
.
A26
2005


17. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3089


18. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3531


19. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2846


20. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
Author: Steven M. Bellovin ... ]et al.[ )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
94
.
A28

