41. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
42. Applied quantum cryptography

by Kollmitzer, Christian | Pivk, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
43. Hash function BLAKE

by Aumasson, Jean-Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
44. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
45. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
46. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
47. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
48. Fundamentals of IP and SoC security : design, verification, and debug

by Bhunia, Swarup | Ray, Sandip | Sur-Kolay, Susmita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland: Springer, 2017Availability: Items available for loan: [Call number: 005.8 BHU] (1).
49. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
50. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
51. Cryptography and secure communication

by Blahut, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
52. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
53. Functional encryption

by Ahmad, Khairol Amali Bin | Ahmad, Khaleel | Dulhare, Uma N.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 621.382 AHM] (1).
54. Quantum cryptography : from key distribution to conference key agreement

by Grasselli, Federico.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
55. Crypto wars : the fight for privacy in the digital age : a political history of digital encryption

by Jarvis, Craig.

Publisher: Boca Raton : CRC Press, 2020Availability: Items available for loan: [Call number: 323.448 JAR] (1).
56. Cryptography arithmetic : algorithms and hardware architectures

by Omondi, Amos R.

Publisher: Cham : Springer, 2020Availability: Items available for loan: [Call number: 005.824 OMO] (1).
57. Cryptography and cryptanalysis in Java : creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10

by Nita, Stefania Loredana | Mihailescu, Marius Iulian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Apress, 2022Availability: Items available for loan: [Call number: 005.82 NIT] (1).
58. Quantum key distribution : an introduction with exercises

by Wolf, Ramona.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 530.12 WOL] (1).
59. Guide to pairing-based cryptography

by El Mrabet, Nadia [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, 2017Availability: Items available for loan: [Call number: 005.82 EIM] (1).

Powered by Koha