21. Codebreakers : Arne Beurling and the Swedish crypto program during world war II

by Beckman, Bengt.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Stockholm: Oxford University Press, 2002Availability: Items available for loan: [Call number: 940.5485 BEC] (1).
22. Public key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland

by Garrett, Paul | Garrett, Paul | Lieman, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rhode Island: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 005.82 GAR] (1).
23. Group theory, statistics, and cyptography

by Myasnikov, Alexei G | Shpilrain, Vladimir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2004Availability: Items available for loan: [Call number: 512.2 MYA] (1).
24. Coding theory and quantum computing : an International Conference on Coding Theory and Quantum Computing, May 20-24, 2003, University of Virginia

by Evans, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 530.12 EVA] (1).
25. Mathematical ciphers : from Caesar to RSA

by Young, Anne L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: American Mathematcial Society, 2006Availability: Items available for loan: [Call number: 652.8 YOU] (1).
26. Coding theory and cryptography : the essentials

by Hankerson, D. R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Marcel Dekker, 2000Availability: Items available for loan: [Call number: 003.54 HAN] (1).
27. Quantum communications and cryptography

by Sergienko, Alexander V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2005Availability: Items available for loan: [Call number: 005.8 SER] (1).
28. Elementary cryptanalysis : a mathematical approach

by Sinkov, Abraham.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Mathematical Association of America, 1998Availability: Items available for loan: [Call number: 652.8 SIN] (1).
29. Cryptological mathematics

by Lewand, Robert Edward.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Mathematical Association of America, 2000Availability: Items available for loan: [Call number: 652.8 LEW] (1).
30. Information security intelligence : cryptographic principles and applications

by Calabrese, Thomas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Australia: Thomson, 2004Availability: Items available for loan: [Call number: 005.8 CAL] (2).
31. User's guide to cryptography and standards

by Mitchell, Chris J | Dent, Alexander W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.8 DEN] (1).
32. Contemporary cryptography

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2005Availability: Items available for loan: [Call number: 005.82 OPP] (1).
33. Cryptanalysis of Number Theoretic Ciphers

by Wagstaff, Samuel S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2003Availability: Items available for loan: [Call number: 005.8 WAG] (1).
34. Cryptography : theory and practice

by Stinson, Douglas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall/CRC, 2002Availability: Items available for loan: [Call number: 005.82 STI] (1).
35. RSA and public-key cryptography

by Mollin, Richard | Mollin, Richard A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Chapman & Hall, 2002Availability: Items available for loan: [Call number: 652.821 MOL] (1).
36. Handbook of elliptic and hyperelliptic curve cryptography

by Cohen, Henri | Frey, Gerhard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 516.352 COH] (1).
37. Applied public key infrastructure : 4th International Workshop : IWAP 2005

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
38. Code book : the secret history of codes and codebreaking

by Singh, Simon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Fourth Estate, 2000Availability: Items available for loan: [Call number: 652.8 SIN] (1).
39. Internet and intranet security management : risks and solutions

by Janczewski, Lech.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hershey: Idea Group Pub., 2000Availability: Items available for loan: [Call number: 005.8 JAN] (1).
40. Discrete mathematics for computer science

by Bogart, Kenneth P | Drysdale, Robert L | Stein, Clifford.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Emeryville: Key College Publishing, 2006Availability: Items available for loan: [Call number: 004.0151 BOG] (1).

Powered by Koha