21. Algorithmic Number Theory

by Buhler, J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 BUH] (1).
22. Information hiding: Second international workshop, IH'98, Portland, Oregon, USA, April 14-17, 1998, Proceedings

by Aucsmith, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 AUC] (1).
23. State of the art in applied cryptography : course on computer security and industrial cryptography leuven, Belgium, June 3-6, 1997

by Preneel, Bart | Preneel, Bart | Rijmen, Vincent | Rijmen, Vincent.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 PRE] (1).
24. Public key cryptography: Second international workshop on practice and theory in public key cryptography, PKC'99 Kamakura, Japan 1-3, 1999

by Imai, Hideki | Zheng, Yuliang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 004 IMA] (1).
25. Physics of quantum information: Quantum cryptography, quantum teleportation, quantum computation

by Bouwmeester, Dirk | Ekert, Artur | Zeilinger, Anton.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004.1 BOU] (1).
26. Decrypted Secrets

by Bauer, Friedrich L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BAU] (1).
27. Course in number theory and cryptography

by Koblitz, Neal.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1994Availability: Items available for loan: [Call number: 512.7 KOB] (3).
28. Cryptographic security architecture : design and verification

by Gutmann, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
29. Modern cryptography, probalistic proofs and pseudorandomness

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 005.82 GOL] (1).
30. Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worecester, MA, USA 17-18, 2000 Proceddings

by Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 KOC] (1).
31. Progress in Cryptology -- INDOCRYPT 2003

by Johansson, Thomas | Maitra, Subhamoy.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 JOH] (1).
32. Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : Proceedings

by Gorodetsky, Vladimir | Popyack, Leonard | Skormin, Victor.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 GOR] (1).

Powered by Koha