|
121.
|
Applied cryptanalysis : breaking ciphers in the real world
by Stamp, Mark | Low, Richard M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
122.
|
Hashing in computer science : fifty years of slicing and dicing
by Konheim, Alan G. Edition: 1st ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
|
|
123.
|
Cryptography engineering : design principles and practical applications
by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
|
|
124.
|
Cryptography and public key infrastructure on the internet
by Schmeh, Klaus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
|
|
125.
|
Cryptography and E-Commerce
by Graff, Jon C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 GRA] (1).
|
|
126.
|
Hiding in plain sight : steganography and the art of covert communication
by Cole, Eric. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
|
|
127.
|
Computer security and cryptography
by Konheim, Alan G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
|
|
128.
|
Codes and Ciphers
by Churchhouse, R. F. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2002Availability: Items available for loan: [Call number: 652.8 CHU] (1).
|
|
129.
|
Elliptic curves in cryptography
by Blake, I. F | Seroussi, G | Smart, N. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
130.
|
Foundations of cryptography II : basic applications
by Goldreich, Oded. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Cambridge University Press, 2004Availability: Items available for loan: [Call number: 652.8 GOL] (1).
|
|
131.
|
Foundations of Cryptography
by Goldreich, Oded. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2001Availability: Items available for loan: [Call number: 005.82 GOL] (1).
|
|
132.
|
Algebraic geometry in coding theory and cryptography
by Niederreiter, Harald | Xing, Chaoping. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton: Princeton University Press, 2009Availability: Items available for loan: [Call number: 003.54 NIE] (1).
|
|
133.
|
Information Science
by Luenberger, David G. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Princeton: Princeton University Press, 2006Availability: Items available for loan: [Call number: 004 LUE] (1).
|
|
134.
|
Beginning cryptography with Java
by Hook, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
|
|
135.
|
Towards a quarter-century of public key cryptography
by Koblitz, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
|
|
136.
|
Elliptic curve public key cryptosystems
by Menezes, Alfred J. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
|
|
137.
|
Security, forensics, stegonagraphy, and watermarking of multimedia contents X
by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
|
|
138.
|
Recent trends in cryptography
by Luengo, Ignacio. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2009Availability: Items available for loan: [Call number: 652.8 LUE] (1).
|
|
139.
|
Algebraic methods in cryptography
by Gerritzen, Lothar. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2006Availability: Items available for loan: [Call number: 652.8 GER] (1).
|
|
140.
|
Number-theoretic algorithms in cryptography
by Vasilenko, O. N | Martsinkovsky, Alex. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2007Availability: Items available for loan: [Call number: 512.7 VAS] (1).
|