語系:
繁體中文
English
說明(常見問題)
登入
Information security and cryptography,
書目資訊
block cipher companion
block cipher companion
fault analysis in cryptography
fault analysis in cryptography
cryptography in constant parallel time
cryptography in constant parallel time
introduction to cryptography
introduction to cryptography
cryptography made simple
cryptography made simple
secure data deletion
secure data deletion
tutorials on the foundations of cryp...
tutorials on the foundations of cryptography
scion
scion
modelling and verification of secure...
modelling and verification of secure exams
introduction to cryptography
introduction to cryptography
cryptography made simple
cryptography made simple
secure data deletion
secure data deletion
modelling and verification of secure...
modelling and verification of secure exams
design of rijndael
design of rijndael
computer security and the internet
computer security and the internet
science of quantitative information flow
science of quantitative information flow
protocols for authentication and key...
protocols for authentication and key establishment
theory of hash functions and random ...
theory of hash functions and random oracles
novel techniques in recovering, embe...
novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
computer security and the internet
computer security and the internet
guide to internet cryptography
complete guide to scion
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入