Your search returned 6 results.

Not what you expected? Check for suggestions
Design and analysis of an attack resistant authentication protocol Sajjad Amin

by Amin, Sajjad (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AMI (2).
Taxonomy of cryptanalysis in Pakistan based on the experience of allied cryptanalysis efforts during world war-II Zaka Ur Rehman

by Rehman, Zaka Ur (Cryptology-1).

Publisher: MCS, May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 REH (2).
Information theoretic analysis of data represented in roman Urdu against normal English Arshad Ali

by Ali, Arshad (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ALI (2).
Design and analysis of symmetric cryptographic algorithm based on 256-bit key or greater for computer communications Talha Muhammad

by Muhammad,Talha (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MUH (2).
Design and development of a key distributin protocol S.M. Junaid Shah

by Shah , Junaid S.M. (Cryptology-1).

Publisher: MCS 1999Availability: Items available for loan: (1).
A software for testing random number sequences Masood Sadiq

by Sadiq, Masood (Cryptology-1).

Publisher: MCS Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SAD (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.