FEEDBACK Smiley face

Your search returned 39 results. Subscribe to this search

|
1. Fundamentals of computer security

by Pieprzyk, Josef.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Springer, ©2003Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 PIE-F] (1).
Items available for reference: IIITD [REF 005.8 PIE-F] (1).

2. Cryptography and network security

by Forouzan, Behrouz A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.82 FOR-F] (1).
Items available for reference: IIITD [REF 005.82 FOR-F] (1).

3. Handbook of applied cryptography

by Menezes, A. J. (Alfred J.) 1965- | Van Oorschot, Paul C | Vanstone, Scott A.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : CRC Press, c1997Other title: Applied cryptography.Online access: Publisher description Availability:
Items available for reference: IIITD [REF 005.82 MEN-H] (1).

4. Cryptography : theory and practice

by Stinson, Douglas R.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Wiley, ©2006Online access: Publisher description Availability: Items available for loan: IIITD [005.82 STI-C] (6).
Items available for reference: IIITD [REF 005.82 STI-C] (1).
Checked out (4).
  (1 votes)
5. Introduction to cryptography with coding theory

by Trappe, Wade | Washington, Lawrence C.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson Education, 2011Availability: Items available for loan: IIITD [005.82 TRA-I] (4).
Items available for reference: IIITD [REF 005.82 TRA-I] (1).

6. Foundations of cryptography : basic tools, vol I

by Goldreich, Oded.

Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cambridge : Cambridge University Press, ©2001Online access: Connect to MyiLibrary resource Availability: Items available for loan: IIITD [005.82 GOL-F] (2).
Items available for reference: IIITD [REF 005.82 GOL-F] (1).

7. Foundations of cryptography : basic applications, vol II

by Goldreich, Oded.

Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Cambridge : Cambridge University Press, ©2004Online access: Connect to MyiLibrary resource Availability: Items available for loan: IIITD [005.82 GOL-F] (1).
Items available for reference: IIITD [REF 005.82 GOL-F] (1).

8. Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, ©2001Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: IIITD [005.82 SCH-A] (5).
Items available for reference: IIITD [REF 005.82 SCH-A] (1).
  (1 votes)
9. Cryptography : theory and practice

by Stinson, Douglas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Chapman & Hall/CRC, ©2002Availability: Items available for loan: IIITD [005.82 STI-C] (1).
Items available for reference: IIITD [REF 005.82 STI-C] (1).

10. Practical cryptography

by Ferguson, Niels | Schneier, Bruce.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, ©2003Availability: Items available for loan: IIITD [REF 005.82 FER-P] (1).

11. Modern cryptography : theory and practice

by Mao, Wenbo.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Pearson, ©2004Availability: Items available for loan: IIITD [005.82 MAO-M] (4).
Items available for reference: IIITD [REF 005.82 MAO-M] (1).

12. Introduction to modern cryptography

by Katz, Jonathan 1974- | Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Chapman & Hall/CRC, c2008Online access: Table of contents only | Publisher description Availability: Items available for loan: IIITD [005.82 KAT-I] (1).
Items available for reference: IIITD [REF 005.82 KAT-I] (1).

13. The code book : the secret history of codes and code breaking

by Singh, Simon.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Doubleday, c1999Online access: Contributor biographical information | Sample text | Publisher description Availability: Items available for loan: IIITD [005.82 SIN-C] (1).
  (2 votes)
14. An introduction to mathematical cryptography

by Hoffstein, Jeffrey | Pipher, Jill Catherine 1955- | Silverman, Joseph H 1955-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York ; London : Springer, 2008Availability: Items available for loan: IIITD [005.82 HOF-I] (1).
Items available for reference: IIITD [REF 005.82 HOF-I] (1).

15. Cryptography and network security

by Forouzan, Behrouz A | Mukhopadhyay, Debdeep.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Tata McGraw Hill, ©2010Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 FOR-C] (1).
Items available for reference: IIITD [REF 005.8 FOR-C] (1).
Checked out (1).

16. Understanding cryptography : a textbook for students and practitioners

by Paar, Christof 1963- | Pelzl, Jan.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Springer, c2010Availability: Items available for loan: IIITD [005.82 PAA-U] (1).

17. Cryptology : classical and modern with maplets

by Klima, Richard E | Sigmon, Neil.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton, FL : CRC Press, c2012Availability: Items available for loan: IIITD [REF 005.82 KLI-C] (1).

18. Fault analysis in cryptography

by Joye, Marc.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Springer, 2012Availability: Items available for loan: IIITD [REF 005.82 JOY-F] (1).

19. Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting

by Cole, Peter H | Ranasinghe, Damith C.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin : Springer, ©2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [REF 621.384 COL-N] (1).

20. Computational number theory and modern cryptography

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: not fiction Online access: Cover image Availability: Items available for loan: IIITD [REF 005.82 YAN-C] (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in