Refine your search

Your search returned 1311 results.

Sort
Results
21.
Computational number theory and modern cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Online access:
Availability: Not available: IIITD: Checked out (1).

22.
Information theory, coding and cryptography by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : TMH, 2013
Availability: Items available for loan: IIITD (1)Call number: 003.54 BOS-I.

23.
Modern cryptography, probabilistic proofs, and pseudorandomness by Series: Algorithms and combinatorics ; 17
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Berlin ; New York : Springer, c1999
Availability: Items available for loan: IIITD (1)Call number: REF 005.8 GOL-M.

24.
Elliptic curves : number theory and cryptography by Series: Discrete mathematics and its applications
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, FL : Chapman & Hall/CRC, ©2008
Online access:
Availability: Items available for loan: IIITD (1)Call number: REF 516.352 WAS-E.

25.
A course in number theory and cryptography by Series: Graduate texts in mathematics ; 114
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Springer, ©1994
Availability: Items available for loan: IIITD (1)Call number: 512.7 KOB-C.

26.
Colossus : the secrets of Bletchley Park's codebreaking computers by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2006
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 COP-C.

27.
An introduction to number theory with cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, c2014
Other title:
  • Number theory with cryptography
Availability: Items available for loan: IIITD (1)Call number: REF 512.7 KRA-I.

28.
Computational number theory by Series: Discrete mathematics and its applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London.: Taylor and Francis, ©2013
Online access:
Availability: Not available: IIITD: Loan on demand (1).

29.
The art of memory forensics : detecting malware and threats in windows, linux, and mac memory by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: canada , John Wiley & Sons : ©2014
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 LIG-A.

30.
Contemporary cryptography by Series: Artech House information security and privacy series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston : Artech House, ©2011
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 OPP-C.

31.
Everyday cryptography : fundamental principles and applications by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2012
Availability: Items available for loan: IIITD (1)Call number: REF 005.82 MAR-E.

32.
Cryptography and information security by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Delhi PHI Learning ©2015
Availability: Items available for loan: IIITD (1)Call number: 005.82 PAC-C.

33.
Introduction to modern cryptography by Series: Chapman & hall/crc cryptography and network security series
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton : CRC Press, ©2015
Availability: Items available for reference: IIITD: Not for loan (1)Call number: REF 005.8 KAT-I.

34.
Towards hardware-intrinsic security : foundations and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Heidelberg ; New York : Springer, ©2010
Availability: Not available: IIITD: Loan on demand (1).

35.
Cryptanalysis : a study of ciphers and their solution by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Dover Publications, ©1956
Availability: Items available for loan: IIITD (1)Call number: 652.8 GAI-C.

36.
Public-key cryptography : theory and practice by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Delhi : Pearson Education, ©2009
Availability: Not available: IIITD: Loan on demand (1).

37.
Bitcoin and cryptocurrency technologies : a comprehensive introduction by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2016
Availability: Items available for loan: IIITD (1)Call number: REF 332.178 NAR-B.

38.
The code book : the science of secrecy from ancient Egypt to quantum cryptography by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Random House, ©1999
Availability: Items available for loan: IIITD (1)Call number: CB 652.8 SIN-C. Not available: IIITD: Checked out (1).

39.
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey : Princeton University Press, ©2017
Availability: Items available for loan: IIITD (1)Call number: 005.82 HOL-M.

40.
Cryptography : a very short introduction by Series: Very short introductions ; 68.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : Oxford University Press, ©2002
Availability: Items available for loan: IIITD (1)Call number: 005.8 PIP-C.

Pages
© 2024 IIIT-Delhi, library@iiitd.ac.in

Powered by Koha