101. Disappearing cryptography : information hiding, steganography and watermarking

by Wayner, Peter.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
102. Cryptographic boolean functions and applications

by Cusick, Thomas W | Stanica, Pantelimon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 CUS] (1).
103. Introduction to cryptography with coding theory

by Trappe, Wade | Washington, Lawrence C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2002Availability: Items available for loan: [Call number: 005.82 TRA] (2).
104. Modern cryptography: Theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
105. NET security and cryptography

by Thorsteinson, Peter | Ganesh, G. Gnana Arun.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
106. Cryptography Decrypted

by Mel, H. X.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
107. Algorithms Unlocked

by Cormen, Thomas H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 005.1 COR] (1).
108. Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection

by Collberg, Christian | Nagra, Jasvir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
109. Encyclopedia of cryptography and security

by Tilborg, Henk C. A. van.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8203 TIL] (1).
110. Classical introduction to cryptography : applications for communications security

by Vaudenay, Serge.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
111. Classical introduction to cryptography exercise book

by Baigneres, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
112. Cryptographic algorithms on reconfigurable hardware

by Saqib, N | Koc, Cetin Kaya | Perez, A. Diaz | Rodriquez-Henriquez, Francisco.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 ROD] (1).
113. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
114. Cryptographic engineering

by Koc, Cetin Kaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
115. Introduction to mathematical cryptography

by Hoffstein, Jeffrey | Pipher, Jill Catherine | Silverman, Joseph H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 652.80151 HOF] (1).
116. Algebraic cryptanalysis

by Bard, Gregory V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BAR] (1).
117. Cryptographic security architecture : design and verification

by Gutmann, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
118. Modern cryptology : a tutorial

by Brassard, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
119. History of information security : a comprehensive handbook

by Bergstra, J. A | Leeuw, Karl de.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
120. Cryptology unlocked

by Wobst, Reinhard | Shafir, Angelika.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).

Powered by Koha