Your search returned 36 results.

Sort
Results
21.
Elliptic curves : number theory and cryptography by Series: Discrete mathematics and its applications
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : Chapman & Hall/CRC, ©2008
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 516.352 WAS-E.

22.
Colossus : the secrets of Bletchley Park's codebreaking computers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2006
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 COP-C.

23.
An introduction to number theory with cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2014
Other title:
  • Number theory with cryptography
Availability: Items available for loan: IIITD (1)Call number: REF 512.7 KRA-I.

24.
Computational number theory by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London.: Taylor and Francis, ©2013
Online access:
Availability: Not available: IIITD: Loan on demand (1).

25.
The art of memory forensics : detecting malware and threats in windows, linux, and mac memory by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: canada , John Wiley & Sons : ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 LIG-A.

26.
Contemporary cryptography by Series: Artech House information security and privacy series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 OPP-C.

27.
Everyday cryptography : fundamental principles and applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 MAR-E.

28.
Introduction to modern cryptography by Series: Chapman & hall/crc cryptography and network security series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAT-I.

29.
Towards hardware-intrinsic security : foundations and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Heidelberg ; New York : Springer, ©2010
Availability: Not available: IIITD: Loan on demand (1).

30.
Public-key cryptography : theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2009
Availability: Not available: IIITD: Loan on demand (1).

31.
Bitcoin and cryptocurrency technologies : a comprehensive introduction by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2016
Availability: Items available for loan: IIITD (1)Call number: REF 332.178 NAR-B.

32.
The code book : the science of secrecy from ancient Egypt to quantum cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Random House, ©1999
Availability: Items available for loan: IIITD (1)Call number: CB 652.8 SIN-C. Not available: IIITD: Checked out (1).

33.
Information theory, coding and cryptography by
Edition: 3rd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chennai : McGraw Hill, ©2016
Availability: Items available for loan: IIITD (1)Call number: 003.54 BOS-I. Not available: IIITD: Loan on demand (1).

34.
Computer security : art and science by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Addison-Wesley, ©2019
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 BIS-C.

35.
Cryptography and network security by
Edition: 4th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Chennai : McGraw Hill, ©2023
Availability: Items available for loan: IIITD (1)Call number: CBIA 005.82 KAH-C.

36.
Cryptography and network security : principles and practice by
Edition: 8th ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Noida : Pearson, ©2023
Availability: Items available for loan: IIITD (1)Call number: 005.82 STA-C. Items available for reference: IIITD: Not for loan (1)Call number: REF 005.82 STA-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in