1. Introduction to cryptography

by Buchmann, Johannes A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BUC] (1).
2. Cryptography and computational number theory

by Pomerance, Carl | Pomerance, Carl.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 1990Availability: Items available for loan: [Call number: 005.8 POM] (1).
3. Coding theory and quantum computing : an International Conference on Coding Theory and Quantum Computing, May 20-24, 2003, University of Virginia

by Evans, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2005Availability: Items available for loan: [Call number: 530.12 EVA] (1).
4. Handbook of elliptic and hyperelliptic curve cryptography

by Cohen, Henri | Frey, Gerhard.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Chapman & Hall, 2005Availability: Items available for loan: [Call number: 516.352 COH] (1).
5. Discrete mathematics for computer science

by Bogart, Kenneth P | Drysdale, Robert L | Stein, Clifford.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Emeryville: Key College Publishing, 2006Availability: Items available for loan: [Call number: 004.0151 BOG] (1).
6. Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop Cologne, Germany, September 8-10, 2003: Proceedings

by Wlater, Colin D | Koc, Cetin Kaya | Paar, Christof.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 004 WLA] (1).
7. Coding theory and cryptology

by Niederreiter, Harald | Niederreiter, Harald | Niederreiter, Harald.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: World Scientific, 2002Availability: Items available for loan: [Call number: 003.54 NIE] (1).
8. Introduction to mathematical cryptography

by Hoffstein, Jeffrey | Pipher, Jill Catherine | Silverman, Joseph H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 652.80151 HOF] (1).
9. Foundations of cryptography II : basic applications

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Cambridge University Press, 2004Availability: Items available for loan: [Call number: 652.8 GOL] (1).
10. Foundations of Cryptography

by Goldreich, Oded.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2001Availability: Items available for loan: [Call number: 005.82 GOL] (1).
11. Recent trends in cryptography

by Luengo, Ignacio.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2009Availability: Items available for loan: [Call number: 652.8 LUE] (1).
12. Number-theoretic algorithms in cryptography

by Vasilenko, O. N | Martsinkovsky, Alex.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2007Availability: Items available for loan: [Call number: 512.7 VAS] (1).
13. Mathematics of encryption : an elementary introduction

by Cozzens, Margaret | Miller, Steven J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 2013Availability: Items available for loan: [Call number: 652.80151 COZ] (1).
14. Mathematics of public key cryptography

by Galbraith, Steven D.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2012Availability: Items available for loan: [Call number: 003.54 GAL] (1).
15. Applied algebra : codes, ciphers and discrete algorithms

by Hardy, Darel W | Richman, Fred | Walker, Carol L.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2009Availability: Items available for loan: [Call number: 003.54 HAR] (1).
16. Cryptanalysis of RSA and its variants

by Hinek, M. Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 HIN] (1).
17. Introduction to cryptography with mathematical foundations and computer implementations

by Stanoyevitch, Alexander.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2010Availability: Items available for loan: [Call number: 005.82 STA] (1).
18. Computational number theory

by Das, Abhijit.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.70285 DAS] (1).
19. Handbook of finite fields

by Mullen, Gary L | Panario, Daniel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2013Availability: Items available for loan: [Call number: 512.3 MUL] (1).
20. Introduction to mathematical cryptography

by Hoffstein, Jeffrey | Pipher, Jill Catherine | Silverman, Joseph H.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2014Availability: Items available for loan: [Call number: 652.80151 HOF] (1).

Powered by Koha