|
181.
|
Post quantum cryptography
by Buchmann, Johannes | Bernstein, Daniel J | Dahme'n, Erik. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BER] (1).
|
|
182.
|
Grobner bases, coding, and cryptography
by Sala, Massimiliano. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 512.44 SAL] (1).
|
|
183.
|
LLL algorithm : survey and applications
by Nguyen, Phong Q | Vallee, Brigitte. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Heidelberg: Springer, 2010Availability: Items available for loan: [Call number: 518.1 NGU] (1).
|
|
184.
|
Quantum private communication
by Zeng, Guihua. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 ZEN] (1).
|
|
185.
|
Understanding cryptography : a textbook for students and practitioners
by Paar, Christof | Pelzl, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (1).
|
|
186.
|
Handbook of information and communication security
by Stavroulakis, Peter. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 STA] (1).
|
|
187.
|
Applied quantum cryptography
by Kollmitzer, Christian | Pivk, Mario. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KOL] (1).
|
|
188.
|
Fundamentals in information theory and coding
by Borda, Monica. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2011Availability: Items available for loan: [Call number: 003.54 BOR] (1).
|
|
189.
|
Hash function BLAKE
by Aumasson, Jean-Philippe. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2014Availability: Items available for loan: [Call number: 005.82 AUM] (1).
|
|
190.
|
Design and Analysis of Algorithms
by Panneerselvam, R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2007Availability: Items available for loan: [Call number: 005.1 PAN] (1).
|
|
191.
|
Information security : theory and practice
by Patel, Dhiren R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2008Availability: Items available for loan: [Call number: 005.82 PAT] (1).
|
|
192.
|
Cryptography and information security
by Pachghare, V. K. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: PHI Learning, 2009Availability: Items available for loan: [Call number: 005.82 PAC] (1).
|
|
193.
|
Security engineering: a guide to building dependable distributed systems
by Anderson, Ross J. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Wiley India, 2008Availability: Items available for loan: [Call number: 005.1 AND] (1).
|
|
194.
|
Public-key cryptography : theory and practice
by Das, Abhijit | Madhavan, C. E. Veni. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Chennai: Pearson Education, 2013Availability: Items available for loan: [Call number: 005.82 DAS] (1).
|
|
195.
|
Introduction to cryptography with coding theory
by Trappe, Wade | Washington, Lawrence C. Edition: 2nd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Delhi: Pearson Education, 2007Availability: Items available for loan: [Call number: 005.82 TRA] (7).
|
|
196.
|
Understanding cryptography : a textbook for students and practitioners
by Paar, Christof | Pelzl, Jan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2010Availability: Items available for loan: [Call number: 005.82 PAA] (5).
|
|
197.
|
Computer networks
by Vijayakumar, B. P | Manvi, Sunilkumar S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Narosa Publishing House, 2009Availability: Items available for loan: [Call number: 004.6 MAN] (1).
|
|
198.
|
Advances in coding theory and crytography
by Shaska, Tanush. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 SHA] (1).
|
|
199.
|
Proceedings of the first international workshop on coding and cryptology
by Li, Yongqing. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey: World Scientific, 2007Availability: Items available for loan: [Call number: 003.54 LIY] (1).
|
|
200.
|
Building secure software: How to avoid security problems the right way
by Viega, John | McGaw, Gary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.1 VIE] (1).
|