|
101.
|
Disappearing cryptography : information hiding, steganography and watermarking
by Wayner, Peter. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Morgan Kaufmann, 2009Availability: Items available for loan: [Call number: 005.82 WAY] (1).
|
|
102.
|
Cryptographic boolean functions and applications
by Cusick, Thomas W | Stanica, Pantelimon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 CUS] (1).
|
|
103.
|
Introduction to cryptography with coding theory
by Trappe, Wade | Washington, Lawrence C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Prentice Hall, 2002Availability: Items available for loan: [Call number: 005.82 TRA] (2).
|
|
104.
|
Modern cryptography: Theory and practice
by Mao, Wenbo. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 005.8 MAO] (1).
|
|
105.
|
NET security and cryptography
by Thorsteinson, Peter | Ganesh, G. Gnana Arun. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi Pearson Education 2004Availability: Items available for loan: [Call number: 005.8 THO] (1).
|
|
106.
|
Cryptography Decrypted
by Mel, H. X. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.82 MEL] (1).
|
|
107.
|
Algorithms Unlocked
by Cormen, Thomas H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 005.1 COR] (1).
|
|
108.
|
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection
by Collberg, Christian | Nagra, Jasvir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: Addison-Wesley, 2010Availability: Items available for loan: [Call number: 005.8 COL] (1).
|
|
109.
|
Encyclopedia of cryptography and security
by Tilborg, Henk C. A. van. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8203 TIL] (1).
|
|
110.
|
Classical introduction to cryptography : applications for communications security
by Vaudenay, Serge. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 VAU] (1).
|
|
111.
|
Classical introduction to cryptography exercise book
by Baigneres, Thomas. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.8 BAI] (1).
|
|
112.
|
Cryptographic algorithms on reconfigurable hardware
by Saqib, N | Koc, Cetin Kaya | Perez, A. Diaz | Rodriquez-Henriquez, Francisco. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 ROD] (1).
|
|
113.
|
Cryptanalytic attacks on RSA
by Yan, Song Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
114.
|
Cryptographic engineering
by Koc, Cetin Kaya. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
|
|
115.
|
Introduction to mathematical cryptography
by Hoffstein, Jeffrey | Pipher, Jill Catherine | Silverman, Joseph H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 652.80151 HOF] (1).
|
|
116.
|
Algebraic cryptanalysis
by Bard, Gregory V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BAR] (1).
|
|
117.
|
Cryptographic security architecture : design and verification
by Gutmann, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 005.8 GUT] (1).
|
|
118.
|
Modern cryptology : a tutorial
by Brassard, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
|
|
119.
|
History of information security : a comprehensive handbook
by Bergstra, J. A | Leeuw, Karl de. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2007Availability: Items available for loan: [Call number: 005.809 LEE] (1).
|
|
120.
|
Cryptology unlocked
by Wobst, Reinhard | Shafir, Angelika. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 WOB] (1).
|