21. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
22. Cryptographic engineering

by Koc, Cetin Kaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
23. Algebraic cryptanalysis

by Bard, Gregory V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BAR] (1).
24. Modern cryptology : a tutorial

by Brassard, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
25. Applied cryptanalysis : breaking ciphers in the real world

by Stamp, Mark | Low, Richard M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
26. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
27. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
28. Mathematics of encryption : an elementary introduction

by Cozzens, Margaret | Miller, Steven J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2013Availability: Items available for loan: [Call number: 652.80151 COZ] (1).
29. Introduction to cryptography with mathematical foundations and computer implementations

by Stanoyevitch, Alexander.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 STA] (1).
30. Computational number theory

by Das, Abhijit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.70285 DAS] (1).
31. Cryptology : classical and modern with maplets

by Klima, Richard E | Sigmon, Neil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 005.82 KLI] (1).
32. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
33. Dynamic secrets in communication security

by Xiao, Sheng | Gong, Weibo | Towsley, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 005.82 XIA] (1).
34. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
35. Timing channels in cryptography : a micro-architectural perspective

by Rebeiro, Chester.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham: Springer, 2015Availability: Items available for loan: [Call number: 005.7 REB] (1).
36. Quantum bits and quantum secrets : how quantum physics is revolutionizing codes and computers

by Morsch, Oliver.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Weinheim: Wiley-VCH, 2008Availability: Items available for loan: [Call number: 005.82 MOR] (1).
37. Applied Cryptography and Network Security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

by Ioannidis, John | Keromytis, Angelos D | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2005Availability: Items available for loan: [Call number: 004 IOA] (1).
38. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
39. Post quantum cryptography

by Buchmann, Johannes | Bernstein, Daniel J | Dahme'n, Erik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BER] (1).
40. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).

Powered by Koha