1. Applied Cryptography and Network Security : First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 ; Proceedings

by Zhou, Jianying | Han, Youngfei | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 ZHO] (1).
2. Introduction to Cryptography

by Delfs, Hans.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2002Availability: Items available for loan: [Call number: 005.82 DEL] (1).
3. Cryptographic Hardware and Embedded Systems CHES 2001: Third International Workshop Paris, France, May 14-16, 2001 Proceedings

by Koc, Cetin Kaya | Naccache, David | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 KOC] (1).
4. Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers

by Christianson, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2001Availability: Items available for loan: [Call number: 004 CHR] (1).
5. Algorithmic Number Theory

by Buhler, J. P.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 1998Availability: Items available for loan: [Call number: 004 BUH] (1).
6. Cryptographic boolean functions and applications

by Cusick, Thomas W | Stanica, Pantelimon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 CUS] (1).
7. Algorithms Unlocked

by Cormen, Thomas H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2013Availability: Items available for loan: [Call number: 005.1 COR] (1).
8. Number-theoretic algorithms in cryptography

by Vasilenko, O. N | Martsinkovsky, Alex.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2007Availability: Items available for loan: [Call number: 512.7 VAS] (1).
9. Algorithmic cryptanalysis

by Joux, Antoine.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 005.82 JOU] (1).
10. Multiple-base number system : theory and applications

by Dimitrov, Vassil | Jullien, Graham | Muscedere, Roberto.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2012Availability: Items available for loan: [Call number: 512.7 DIM] (1).
11. Modern cryptography, probalistic proofs and pseudorandomness

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 1999Availability: Items available for loan: [Call number: 005.82 GOL] (1).
12. Algorithmic adventures : from knowledge to magic

by Hromkovic, Juraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2009Availability: Items available for loan: [Call number: 005.1 HRO] (1).
13. Design and Analysis of Algorithms

by Panneerselvam, R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.1 PAN] (1).
14. Applied cryptography : protocols, algorithms and source code in C

by Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 2001Availability: Items available for loan: [Call number: 005.82 SCH] (3).
15. Quantum computation and quantum information

by Nielsen, Michael A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi Cambridge University Press 2010Availability: Items available for loan: [Call number: 004.1 NIE] (1).
16. Understanding the digital world : what you need to know about computers, the internet, privacy, and security

by Kernighan, Brian W.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Princeton Princeton University Press 2017Availability: Items available for loan: [Call number: 004 KER] (1).
17. Security of block ciphers : from algorithm design to hardware implementation

by Sakiyama, Kazuo | Sasaki, Yu | Li, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Wiley & Sons 2015Availability: Items available for loan: [Call number: 005.82 SAK] (1).
18. Improving image quality in visual cryptography

by Yan, Bin | Xiang, Yong | Hua, Guang.

Publisher: Singapore Springer 2020Availability: Items available for loan: [Call number: 003.54 YAN] (1).
19. Basic concepts in algorithms

by Klein, Shmuel Tomi.

Publisher: Hoboken : World Scientific, 2021Availability: Items available for loan: [Call number: 518.1 KLE] (1).

Powered by Koha