181. Post quantum cryptography

by Buchmann, Johannes | Bernstein, Daniel J | Dahme'n, Erik.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BER] (1).
182. Grobner bases, coding, and cryptography

by Sala, Massimiliano.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 512.44 SAL] (1).
183. LLL algorithm : survey and applications

by Nguyen, Phong Q | Vallee, Brigitte.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2010Availability: Items available for loan: [Call number: 518.1 NGU] (1).
184. Quantum private communication

by Zeng, Guihua.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
185. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
186. Handbook of information and communication security

by Stavroulakis, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
187. Applied quantum cryptography

by Kollmitzer, Christian | Pivk, Mario.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
188. Fundamentals in information theory and coding

by Borda, Monica.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 003.54 BOR] (1).
189. Hash function BLAKE

by Aumasson, Jean-Philippe.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
190. Design and Analysis of Algorithms

by Panneerselvam, R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.1 PAN] (1).
191. Information security : theory and practice

by Patel, Dhiren R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
192. Cryptography and information security

by Pachghare, V. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
193. Security engineering: a guide to building dependable distributed systems

by Anderson, Ross J.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
194. Public-key cryptography : theory and practice

by Das, Abhijit | Madhavan, C. E. Veni.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
195. Introduction to cryptography with coding theory

by Trappe, Wade | Washington, Lawrence C.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 005.82 TRA] (7).
196. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
197. Computer networks

by Vijayakumar, B. P | Manvi, Sunilkumar S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Narosa Publishing House, 2009Availability: Items available for loan: [Call number: 004.6 MAN] (1).
198. Advances in coding theory and crytography

by Shaska, Tanush.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 SHA] (1).
199. Proceedings of the first international workshop on coding and cryptology

by Li, Yongqing.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
200. Building secure software: How to avoid security problems the right way

by Viega, John | McGaw, Gary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).

Powered by Koha