|
21.
|
Codebreakers : Arne Beurling and the Swedish crypto program during world war II
by Beckman, Bengt. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Stockholm: Oxford University Press, 2002Availability: Items available for loan: [Call number: 940.5485 BEC] (1).
|
|
22.
|
Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland
by Garrett, Paul | Garrett, Paul | Lieman, Daniel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
|
|
23.
|
Group theory, statistics, and cyptography
by Myasnikov, Alexei G | Shpilrain, Vladimir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2004Availability: Items available for loan: [Call number: 512.2 MYA] (1).
|
|
24.
|
Coding theory and quantum computing : an International Conference on Coding Theory and Quantum Computing, May 20-24, 2003, University of Virginia
by Evans, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Providence: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 530.12 EVA] (1).
|
|
25.
|
Mathematical ciphers : from Caesar to RSA
by Young, Anne L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: U.S.A.: American Mathematcial Society, 2006Availability: Items available for loan: [Call number: 652.8 YOU] (1).
|
|
26.
|
Coding theory and cryptography : the essentials
by Hankerson, D. R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Marcel Dekker, 2000Availability: Items available for loan: [Call number: 003.54 HAN] (1).
|
|
27.
|
Quantum communications and cryptography
by Sergienko, Alexander V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
|
|
28.
|
Elementary cryptanalysis : a mathematical approach
by Sinkov, Abraham. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Mathematical Association of America, 1998Availability: Items available for loan: [Call number: 652.8 SIN] (1).
|
|
29.
|
Cryptological mathematics
by Lewand, Robert Edward. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Washington: Mathematical Association of America, 2000Availability: Items available for loan: [Call number: 652.8 LEW] (1).
|
|
30.
|
Information security intelligence : cryptographic principles and applications
by Calabrese, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
|
|
31.
|
User's guide to cryptography and standards
by Mitchell, Chris J | Dent, Alexander W. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
|
|
32.
|
Contemporary cryptography
by Oppliger, Rolf. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.82 OPP] (1).
|
|
33.
|
Cryptanalysis of Number Theoretic Ciphers
by Wagstaff, Samuel S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
|
|
34.
|
Cryptography : theory and practice
by Stinson, Douglas R. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall/CRC, 2002Availability: Items available for loan: [Call number: 005.82 STI] (1).
|
|
35.
|
RSA and public-key cryptography
by Mollin, Richard | Mollin, Richard A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
|
|
36.
|
Handbook of elliptic and hyperelliptic curve cryptography
by Cohen, Henri | Frey, Gerhard. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 516.352 COH] (1).
|
|
37.
|
Applied public key infrastructure : 4th International Workshop : IWAP 2005
by Zhou, Jianying. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
|
|
38.
|
Code book : the secret history of codes and codebreaking
by Singh, Simon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: London: Fourth Estate, 2000Availability: Items available for loan: [Call number: 652.8 SIN] (1).
|
|
39.
|
Internet and intranet security management : risks and solutions
by Janczewski, Lech. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
|
|
40.
|
Discrete mathematics for computer science
by Bogart, Kenneth P | Drysdale, Robert L | Stein, Clifford. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Emeryville: Key College Publishing, 2006Availability: Items available for loan: [Call number: 004.0151 BOG] (1).
|