Skip to main content
Resource Centre
Lists
Public lists
interesting??
Copyrights, Patents & IPR
Albert Einstein
Bharat Ratna Awardees
A Very Short Introduction
Music
Elections and Democracy in India
GATE
Quantum Science and Technology
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
RC Home
|
Contact Us
Resource Centre
Home
Trending
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog
Advanced search
Course reserves
Authority search
Tag cloud
Most popular
Libraries
Log in to your account
Card number or username:
Password:
Forgot your password?
Home
Advanced search
Results of search for 'su:"Public key cryptography"', page 1 of 2
Refine your search
Availability
Limit to records with available items
Authors
Bashir, Imran
Bertino, Elisa
Burnett, Steve
Chatterjee, Sanjit
Damgard, Ivan
Das, Abhijit
Delfs, Hans
Dooley, John F
Galbreath, Nick
Garrett, Paul
Heins, Kersten
Hinek, M. Jason
Igarashi, Yoshihide
Imai, Hideki
Jarvis, Craig
Koblitz, Neal
Lieman, Daniel
Lisdorf, Anders
Madhavan, C. E. Veni
Mollin, Richard A.
Show more
Show less
Item types
Books
CD-DVDs
Series
Artech House information security and priacy series
Chapman & Hall/CRC cryptography and network security
Discrete mathematics and its applications
Expert insight
Frontiers in artificial intelligence and applications
History of computing
Kluwer international series in engineering and computer science. Communications and information theory
Lecture notes in computer science
Lecture notes in computer science ; 1560
Proceedings of symposia in applied mathematics
Springer Briefs in computer science
Synthesis lectures on engineering, science, and technology
Texts in theoretical computer science
Show more
Show less
Topics
Central Intelligence Agency (CIA)
Clinton administration
Computers -- Access control
Computer science
Computer security
Cryptography
Cypherpunks
Data encryption
Data encryption (Computer science)
Data Encryption Standard (DES)
Electrical Technology
Elliptic curve
Invention Secrets Act
National Security Agency (NSA)
Operation BULLRUN
Public key cryptography
Public-key cryptography
Public Key Cryptography
Public key infrastructure (Computer security)
Telecommunication -- Security measures -- Mathematics
Show more
Show less
Your search returned 26 results.
Not what you expected? Check for
suggestions
Sort
1
2
Next
Last
Sort results by:
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
Public lists
Music
Quantum Science and Technology
New list
Place hold
Results
1.
Image from Google Jackets
Elliptic curve public key cryptosystems
by
Menezes, Alfred J
Series:
Kluwer international series in engineering and computer science. Communications and information theory
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Kluwer Academic Publishers,
1993
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 MEN
.
Place hold
Save to lists
2.
Image from Google Jackets
Towards a quarter-century of public key cryptography
by
Koblitz, Neal
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Kluwer Academic Publishers,
2000
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 KOB
.
Place hold
Save to lists
3.
Image from Google Jackets
Codes : the guide to secrecy from ancient to modern times
by
Mollin, Richard A
Series:
Discrete mathematics and its applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
Chapman & Hall,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 MOL
.
Place hold
Save to lists
4.
Image from Google Jackets
Cryptography and public key infrastructure on the internet
by
Schmeh, Klaus
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Chichester:
John Wiley & Sons,
2001
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 SCH
.
Place hold
Save to lists
5.
Image from Google Jackets
Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland
by
Garrett, Paul
Garrett, Paul
Lieman, Daniel
Series:
Proceedings of symposia in applied mathematics
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Rhode Island:
American Mathematcial Society,
2005
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 GAR
.
Place hold
Save to lists
6.
Image from Google Jackets
Applied public key infrastructure : 4th International Workshop : IWAP 2005
by
Zhou, Jianying
Series:
Frontiers in artificial intelligence and applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Amsterdam:
IOS Press,
2006
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 ZHO
.
Place hold
Save to lists
7.
Image from Google Jackets
Internet security : cryptographic principles, algorithms, and protocols
by
Rhee, Man Young
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Chichester:
John Wiley & Sons,
2003
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 RHE
.
Place hold
Save to lists
8.
Image from Google Jackets
Cryptanalysis of RSA and its variants
by
Hinek, M. Jason
Series:
Chapman & Hall/CRC cryptography and network security
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2010
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 HIN
.
Place hold
Save to lists
9.
Image from Google Jackets
Public-key cryptography
by
Salomma, Arto
Series:
Texts in theoretical computer science
Edition:
2nd ed.
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
1996
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 SAL
.
Place hold
Save to lists
10.
Image from Google Jackets
Public-key cryptography : theory and practice
by
Das, Abhijit
Madhavan, C. E. Veni
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Chennai:
Pearson Education,
2013
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 DAS
.
Place hold
Save to lists
11.
Image from Google Jackets
RSA and public-key cryptography
by
Mollin, Richard
Mollin, Richard A
Series:
Discrete mathematics and its applications
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
Chapman & Hall,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
652.821 MOL
.
Place hold
Save to lists
12.
Image from Google Jackets
Cryptography for Database and Internet Applications
by
Galbreath, Nick
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Wiley Publishing,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 GAL
.
Place hold
Save to lists
13.
Image from Google Jackets
Introduction to identity-based encryption
by
Martin, Luther
Series:
Artech House information security and priacy series
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boston:
Artech House,
2008
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 MAR
.
Place hold
Save to lists
14.
Image from Google Jackets
Identity based encryption
by
Chatterjee, Sanjit
Sarkar, Palash
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer,
2011
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 CHA
.
Place hold
Save to lists
15.
Image from Google Jackets
RSA Security's Official Guide to Cryptography
by
Burnett, Steve
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New Delhi:
Tata McGraw-Hill,
2002
Availability:
Items available for loan:
DAU
(2)
Call number:
005.82 BUR, ..
.
Place hold
Save to lists
16.
Image from Google Jackets
Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999
by
Imai, Hideki
Zheng, Yuliang
Series:
Lecture notes in computer science ; 1560
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
1999
Availability:
Items available for loan:
DAU
(1)
Call number:
004 IMA
.
Place hold
Save to lists
17.
Image from Google Jackets
Introduction to Cryptography
by
Delfs, Hans
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
New York:
Springer-Verlag,
2002
Availability:
Items available for loan:
DAU
(1)
Call number:
005.82 DEL
.
Place hold
Save to lists
18.
Image from Google Jackets
History of cryptography and cryptanalysis : codes, ciphers, and their algorithms
by
Dooley, John F
Series:
History of computing
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Cham :
Springer,
2018
Availability:
Items available for loan:
DAU
(1)
Call number:
652.8 DOO
.
Place hold
Save to lists
19.
Image from Google Jackets
Computing : a historical and technical perspective
by
Igarashi, Yoshihide
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Boca Raton:
CRC Press,
2014
Availability:
Items available for loan:
DAU
(1)
Call number:
004 IGA
.
Place hold
Save to lists
20.
Image from Google Jackets
Lectures on data security : modern cryptology in theory and practice
by
Damgard, Ivan
Series:
; 1561
|
Lecture notes in computer science
Material type:
Text
; Format:
print
; Literary form:
Not fiction
Publication details:
Berlin:
Springer-Verlag,
1990
Availability:
Items available for loan:
DAU
(1)
Call number:
004 DAM
.
Lists:
Quantum Science and Technology
.
Place hold
Save to lists
1
2
Next
Last
Not finding what you're looking for?
Make a
purchase suggestion