1. Quantum cryptography using coherent states : randomized encryption and key generation

by Corndorf, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: U.S.A.: ProQuest, 2005Availability: Items available for loan: [Call number: 005.82 COR] (1).
2. Java cryptography extensions : practical guide for programmers.

by Weiss, Jason.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Morgan Kaufmann, 2004Availability: Items available for loan: [Call number: 005.82 WEI] (1).
3. Classical and contemporary cryptology

by Spillman, Richard J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Pearson Education, 2004Availability: Items available for loan: [Call number: 652.8 SPI] (2).
4. Introduction to cryptography with coding theory

by Trappe, Wade | Washington, Lawrence C.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Prentice Hall, 2006Availability: Items available for loan: [Call number: 005.82 TRA] (1).
5. Crypto : how the code rebels beat the government - saving privacy in the digital age

by Levy, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Penguin Books, 2001Availability: Items available for loan: [Call number: 005.8 LEV] (1).
6. Codes and cryptography

by Welsh, Dominic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Oxford: Clarendon press, 2000Availability: Items available for loan: [Call number: 005.82 WEL] (1).
7. Computers Ltd : what they really can't do

by Harel, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Oxford University Press, 2003Availability: Items available for loan: [Call number: 004 HAR] (1).
8. Cryptography and data security

by Denning, Dorothy E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Reading: Addison-Wesley, 1982Availability: Items available for loan: [Call number: 005.82 DEN] (1).
9. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
10. Practical cryptology and web security.

by Yuen, P. K.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.82 YUE] (1).
11. Introduction to cryptography

by Buchmann, Johannes A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 005.82 BUC] (1).
12. Internet security : cryptographic principles, algorithms, and protocols

by Rhee, Man Young.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.82 RHE] (1).
13. Cryptography, information theory, and error-correction : a handbook for the twenty first century

by Bruen, Aiden A | Forcinito, Mario A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: John Wiley & Sons, 2005Availability: Items available for loan: [Call number: 005.8 BRU] (1).
14. Primes and programming : an introduction to number theory with computing

by Giblin, Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 1997Availability: Items available for loan: [Call number: 512.72 GIB] (1).
15. Complexity and cryptography : an introduction

by Talbot, John | Welsh, Dominic.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 005.82 TAL] (1).
16. Quantum cryptography and secret-key distillation

by Van Assche, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2006Availability: Items available for loan: [Call number: 005.82 VAN] (1).
17. Introduction to cryptography with Java applets

by Bishop, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2003Availability: Items available for loan: [Call number: 005.8 BIS] (1).
18. Malicious cryptography : exposing cryptovirology

by Young, Adam | Yung, Moti.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indiana: John Wiley & Sons, 2004Availability: Items available for loan: [Call number: 005.82 YOU] (1).
19. Contemporary cryptology : the science of information integrity

by Simmons, Gustavus J.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1992Availability: Items available for loan: [Call number: 005.82 SIM] (1).
20. Cryptography and computational number theory

by Pomerance, Carl | Pomerance, Carl.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Providence: American Mathematcial Society, 1990Availability: Items available for loan: [Call number: 005.8 POM] (1).

Powered by Koha