|
21.
|
Algorithmic Number Theory
by Buhler, J. P. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 BUH] (1).
|
|
22.
|
Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings
by Aucsmith, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
|
|
23.
|
State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997
by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
|
|
24.
|
Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999
by Imai, Hideki | Zheng, Yuliang. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
|
|
25.
|
Physics of quantum information: Quantum cryptography, quantum teleportation, quantum computation
by Bouwmeester, Dirk | Ekert, Artur | Zeilinger, Anton. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004.1 BOU] (1).
|
|
26.
|
Decrypted Secrets
by Bauer, Friedrich L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
|
|
27.
|
Course in number theory and cryptography
by Koblitz, Neal. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 1994Availability: Items available for loan: [Call number: 512.7 KOB] (3).
|
|
28.
|
Cryptographic security architecture : design and verification
by Gutmann, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
|
|
29.
|
Modern cryptography, probalistic proofs and pseudorandomness
by Goldreich, Oded. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 005.82 GOL] (1).
|
|
30.
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings
by Koc, Cetin Kaya | Paar, Christof. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
|
|
31.
|
Progress in Cryptology -- INDOCRYPT 2003
by Johansson, Thomas | Maitra, Subhamoy. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
|
|
32.
|
Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings
by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).
|