<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Resultados para "Data encryption (Computer Science)."</title>
    <description>A mostrar 1 - 50 resultados de 126</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22Data+encryption+%28Computer+Science%29.%22&amp;type=Subject&amp;lng=pt</link>
    <opensearch:totalResults>126</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22Data%20encryption%20%28Computer%20Science%29.%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+Science%29.%22&amp;type=Subject&amp;lng=pt"/>
    <atom:link rel="next" type="application/rss+xml" title="Go to Next Page" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+Science%29.%22&amp;type=Subject&amp;lng=pt&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+Science%29.%22&amp;type=Subject&amp;lng=pt&amp;page=3"/>
    <atom:link rel="self" type="application/rss+xml" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Data+encryption+%28Computer+Science%29.%22&amp;type=Subject&amp;lng=pt"/>
    <item>
      <title>Parallelized factoring operation for the RSA public key</title>
      <pubDate>Wed, 01 Jan 1997 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602381354</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602381354</guid>
      <author>Estrella, Florida Valerio</author>
      <dc:format>Thesis</dc:format>
      <dc:date>1997</dc:date>
      <dc:creator>Estrella, Florida Valerio</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Internet security for business</title>
      <pubDate>Mon, 01 Jan 1996 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602984849</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602984849</guid>
      <dc:format>Livro</dc:format>
      <dc:date>1996</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>An improvement on logical key hierarchy algorithm for multicast and group security</title>
      <pubDate>Sat, 01 Jan 2005 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608175395</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608175395</guid>
      <author>Ho Hai Van</author>
      <dc:format>Thesis</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Ho Hai Van</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Performance benchmarking of new software stream ciphers for secure multimedia streaming in resource-constrained devices</title>
      <pubDate>Fri, 01 Jan 2010 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217610396022</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217610396022</guid>
      <author>Sarcaoga, Ronald L.</author>
      <dc:format>Thesis</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Sarcaoga, Ronald L.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advanced techniques for audio watermarking</title>
      <pubDate>Wed, 01 Jan 2020 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613975431</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613975431</guid>
      <author>Thanki, Rohit M.</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Thanki, Rohit M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Lattice-based public-key cryptography in hardware</title>
      <pubDate>Wed, 01 Jan 2020 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613975813</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613975813</guid>
      <author>Sinha Roy, Sujoy</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Sinha Roy, Sujoy</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Improving image quality in visual cryptography</title>
      <pubDate>Wed, 01 Jan 2020 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613975180</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613975180</guid>
      <author>Yan, Bin</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Yan, Bin</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Evolution of smart sensing ecosystems with tamper evident security</title>
      <pubDate>Fri, 01 Jan 2021 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931311837535</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931311837535</guid>
      <author>Sniatala, Pawel</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2021</dc:date>
      <dc:creator>Sniatala, Pawel</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Burdens of proof cryptographic culture and evidence law in the age of electronic documents</title>
      <pubDate>Sun, 01 Jan 2012 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-1685675941122073839</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-1685675941122073839</guid>
      <author>Blanchette, Jean-François</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2012</dc:date>
      <dc:creator>Blanchette, Jean-François</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hardware protection through obfuscation</title>
      <pubDate>Sun, 01 Jan 2017 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613117406</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613117406</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2017</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Timing channels in cryptography a micro-architectural perspective</title>
      <pubDate>Thu, 01 Jan 2015 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612861244</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612861244</guid>
      <author>Rebeiro, Chester</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Rebeiro, Chester</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Why cryptography should not rely on physical attack complexity</title>
      <pubDate>Thu, 01 Jan 2015 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612861552</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612861552</guid>
      <author>Kramer, Juliane</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Kramer, Juliane</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Foundations of security what every programmer needs to know</title>
      <pubDate>Mon, 01 Jan 2007 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612036601</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612036601</guid>
      <author>Daswani, Neil</author>
      <dc:format>Livro</dc:format>
      <dc:date>2007</dc:date>
      <dc:creator>Daswani, Neil</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in intelligent information hiding and multimedia signal processing proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, November 21-23, 2016, Kaohsiung, Taiwan</title>
      <pubDate>Sun, 01 Jan 2017 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613118202</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613118202</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2017</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and network security principles and practice</title>
      <pubDate>Sun, 01 Jan 2006 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217603051245</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217603051245</guid>
      <author>Stallings, William</author>
      <dc:format>Livro</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Stallings, William</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>EASiCard Encryptor of audio streams on smart cards</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608946977</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608946977</guid>
      <author>Cantillas, Joan Lotus T.</author>
      <dc:format>Thesis</dc:format>
      <dc:creator>Cantillas, Joan Lotus T.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Financial cryptography second international conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings</title>
      <pubDate>Thu, 01 Jan 1998 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217603001450</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217603001450</guid>
      <dc:format>Livro</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Implementing elliptic curve cryptography</title>
      <pubDate>Fri, 01 Jan 1999 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217609022179</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217609022179</guid>
      <author>Rosing, Michael 1954-</author>
      <dc:format>Livro</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Rosing, Michael 1954-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>PGP Pretty good privacy</title>
      <pubDate>Sun, 01 Jan 1995 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217609009169</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217609009169</guid>
      <author>Garfinkel, Simson</author>
      <dc:format>Livro</dc:format>
      <dc:date>1995</dc:date>
      <dc:creator>Garfinkel, Simson</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Certificate authority system</title>
      <pubDate>Wed, 01 Jan 2003 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608094434</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608094434</guid>
      <author>Buenviaje, Anna Marie B.</author>
      <dc:format>Thesis</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Buenviaje, Anna Marie B.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Internet cryptography</title>
      <pubDate>Wed, 01 Jan 1997 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217609009153</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217609009153</guid>
      <author>Smith, Richard E. 1952-</author>
      <dc:format>Livro</dc:format>
      <dc:date>1997</dc:date>
      <dc:creator>Smith, Richard E. 1952-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A VHDL implementation of elliptic curve elgamal encryption</title>
      <pubDate>Fri, 01 Jan 1999 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608094528</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608094528</guid>
      <author>Serafica, Michelangelo A.</author>
      <dc:format>Thesis</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Serafica, Michelangelo A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>ACM transactions on information and system security.</title>
      <pubDate>Fri, 01 Jan 2010 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99946688289986863</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99946688289986863</guid>
      <dc:format>Livro</dc:format>
      <dc:date>2010</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Noiseless steganography the key to covert communications</title>
      <pubDate>Sun, 01 Jan 2012 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217610883132</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217610883132</guid>
      <author>Desoky, Abdelrahman</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2012</dc:date>
      <dc:creator>Desoky, Abdelrahman</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Visual cryptography and secret image sharing</title>
      <pubDate>Sun, 01 Jan 2012 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217610646917</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217610646917</guid>
      <dc:format>Livro</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>QC-LDPC code-based cryptography</title>
      <pubDate>Wed, 01 Jan 2014 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612770656</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612770656</guid>
      <author>Baldi, Marco</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Baldi, Marco</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>New directions of modern cryptography</title>
      <pubDate>Tue, 01 Jan 2013 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217610883126</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217610883126</guid>
      <author>Cao, Zhenfu</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Cao, Zhenfu</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>CryptoGraphics exploiting graphics cards for security</title>
      <pubDate>Sun, 01 Jan 2006 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612712625</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612712625</guid>
      <author>Cook, Debra L.</author>
      <dc:format>Livro</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Cook, Debra L.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computational number theory</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611057977</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611057977</guid>
      <author>Das, Abhijit 1968-</author>
      <dc:format>Livro</dc:format>
      <dc:creator>Das, Abhijit 1968-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Algebraic curves in cryptography</title>
      <pubDate>Tue, 01 Jan 2013 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611289669</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611289669</guid>
      <author>Ling, San 1964-</author>
      <dc:format>Livro</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Ling, San 1964-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Multivariate public key cryptosystems</title>
      <pubDate>Sun, 01 Jan 2006 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612019656</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612019656</guid>
      <author>Ding, Jintai</author>
      <dc:format>Livro</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Ding, Jintai</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Machine learning in image steganalysis</title>
      <pubDate>Sun, 01 Jan 2012 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611155094</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611155094</guid>
      <author>Schaathun, Hans Georg</author>
      <dc:format>Livro</dc:format>
      <dc:date>2012</dc:date>
      <dc:creator>Schaathun, Hans Georg</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Multimedia forensics and security foundations, innovations, and applications</title>
      <pubDate>Sun, 01 Jan 2017 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613117808</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613117808</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2017</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Proceedings of the 2nd Workshop on Communication Security cryptography and physical layer security</title>
      <pubDate>Mon, 01 Jan 2018 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613297779</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613297779</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Fundamentals of IP and SoC security design, verification, and debug</title>
      <pubDate>Sun, 01 Jan 2017 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613117672</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613117672</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2017</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and network security principles and practice</title>
      <pubDate>Sun, 01 Jan 2017 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612992423</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612992423</guid>
      <author>Stallings, William</author>
      <dc:format>Livro</dc:format>
      <dc:date>2017</dc:date>
      <dc:creator>Stallings, William</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in intelligent information hiding and multimedia signal processing proceeding of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August, 12-15, 2017, Matsue, Shimane, Japan</title>
      <pubDate>Mon, 01 Jan 2018 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613250199</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613250199</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Introduction to cryptography with mathematical foundations and computer implementations</title>
      <pubDate>Sat, 01 Jan 2011 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217609913149</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217609913149</guid>
      <author>Stanoyevitch, Alexander</author>
      <dc:format>Livro</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Stanoyevitch, Alexander</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>View state security.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217609741353</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217609741353</guid>
      <author>Sullivan, Bryan</author>
      <dc:format>Artigo</dc:format>
      <dc:creator>Sullivan, Bryan</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Modern cryptanalysis techniques for advanced code breaking</title>
      <pubDate>Tue, 01 Jan 2008 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217609781393</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217609781393</guid>
      <author>Swenson, Christopher 1983-</author>
      <dc:format>Livro</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Swenson, Christopher 1983-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hashing in computer science fifty years of slicing and dicing</title>
      <pubDate>Fri, 01 Jan 2010 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217610121365</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217610121365</guid>
      <author>Konheim, Alan G. 1934-</author>
      <dc:format>Livro</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Konheim, Alan G. 1934-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Multi-photon quantum secure communication</title>
      <pubDate>Tue, 01 Jan 2019 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613707980</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613707980</guid>
      <author>Verma, Pramode K.</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Verma, Pramode K.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptology transmitted message protection from deterministic chaos up to optical vortices</title>
      <pubDate>Fri, 01 Jan 2016 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612936195</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612936195</guid>
      <author>Izmailov, Igor</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Izmailov, Igor</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Fault Tolerant Architectures for Cryptography and Hardware Security</title>
      <pubDate>Mon, 01 Jan 2018 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613392131</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613392131</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in audio watermarking based on singular value decomposition</title>
      <pubDate>Thu, 01 Jan 2015 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217612665442</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217612665442</guid>
      <author>Dhar, Pranab Kumar</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Dhar, Pranab Kumar</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hiding data selected topics : Rudolf Ahlswede's lectures on information theory 3</title>
      <pubDate>Fri, 01 Jan 2016 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613033487</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613033487</guid>
      <author>Ahlswede, Rudolf 1938-</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Ahlswede, Rudolf 1938-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Distributed ledger technology and digital assets policy and regulatory challenges in Asia.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613764931</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613764931</guid>
      <dc:format>Electronic Resource</dc:format>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The Block Cipher Companion</title>
      <pubDate>Sat, 01 Jan 2011 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611173248</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611173248</guid>
      <author>Knudsen, Lars 1962-</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Knudsen, Lars 1962-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in Cryptology - ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</title>
      <pubDate>Sat, 01 Jan 2011 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611057524</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611057524</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2011</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in Cryptology - CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings</title>
      <pubDate>Sat, 01 Jan 2011 19:32:38 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611057525</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611057525</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2011</dc:date>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
