121. Applied cryptanalysis : breaking ciphers in the real world

by Stamp, Mark | Low, Richard M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley, 2007Availability: Items available for loan: [Call number: 005.82 STA] (1).
122. Hashing in computer science : fifty years of slicing and dicing

by Konheim, Alan G.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2010Availability: Items available for loan: [Call number: 005.82 KON] (1).
123. Cryptography engineering : design principles and practical applications

by Ferguson, Niels | Kohno, Tadayoshi | Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: Wiley, 2010Availability: Items available for loan: [Call number: 005.82 FER] (1).
124. Cryptography and public key infrastructure on the internet

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (1).
125. Cryptography and E-Commerce

by Graff, Jon C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 GRA] (1).
126. Hiding in plain sight : steganography and the art of covert communication

by Cole, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 COL] (2).
127. Computer security and cryptography

by Konheim, Alan G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: Wiley-Interscience, 2007Availability: Items available for loan: [Call number: 005.8 KON] (1).
128. Codes and Ciphers

by Churchhouse, R. F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2002Availability: Items available for loan: [Call number: 652.8 CHU] (1).
129. Elliptic curves in cryptography

by Blake, I. F | Seroussi, G | Smart, N. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 1999Availability: Items available for loan: [Call number: 005.82 BLA] (1).
130. Foundations of cryptography II : basic applications

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2004Availability: Items available for loan: [Call number: 652.8 GOL] (1).
131. Foundations of Cryptography

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2001Availability: Items available for loan: [Call number: 005.82 GOL] (1).
132. Algebraic geometry in coding theory and cryptography

by Niederreiter, Harald | Xing, Chaoping.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton: Princeton University Press, 2009Availability: Items available for loan: [Call number: 003.54 NIE] (1).
133. Information Science

by Luenberger, David G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton: Princeton University Press, 2006Availability: Items available for loan: [Call number: 004 LUE] (1).
134. Beginning cryptography with Java

by Hook, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
135. Towards a quarter-century of public key cryptography

by Koblitz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2000Availability: Items available for loan: [Call number: 005.82 KOB] (1).
136. Elliptic curve public key cryptosystems

by Menezes, Alfred J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 1993Availability: Items available for loan: [Call number: 005.82 MEN] (1).
137. Security, forensics, stegonagraphy, and watermarking of multimedia contents X

by Delp, Edward J | Dittmann, Jana | Memon, Nasir D | Wong, Ping Wah.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Bellingham: SPIE, 2008Availability: Items available for loan: [Call number: 005.8 DEL] (1).
138. Recent trends in cryptography

by Luengo, Ignacio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2009Availability: Items available for loan: [Call number: 652.8 LUE] (1).
139. Algebraic methods in cryptography

by Gerritzen, Lothar.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2006Availability: Items available for loan: [Call number: 652.8 GER] (1).
140. Number-theoretic algorithms in cryptography

by Vasilenko, O. N | Martsinkovsky, Alex.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2007Availability: Items available for loan: [Call number: 512.7 VAS] (1).

Powered by Koha