1. Concurrent zero knowledge

by Rosen, Alon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2006Availability: Items available for loan: [Call number: 005.8 ROS] (1).
2. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
3. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
4. Introduction to cryptography : principles and applications

by Delfs, Hans | Knebl, Helmut.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 DEL] (1).
5. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).
6. LLL algorithm : survey and applications

by Nguyen, Phong Q | Vallee, Brigitte.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Heidelberg: Springer, 2010Availability: Items available for loan: [Call number: 518.1 NGU] (1).
7. Cryptography arithmetic : algorithms and hardware architectures

by Omondi, Amos R.

Publisher: Cham : Springer, 2020Availability: Items available for loan: [Call number: 005.824 OMO] (1).

Powered by Koha