Refine your search

Your search returned 178 results.

Not what you expected? Check for suggestions
Fundamentals of computer security Josef Pieprzyk.

by Pieprzyk, Josef.

Publisher: Berlin : New York : Springer, c2003Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 PIE (1).
Cryptography: theory and practice Douglas R. Stinson.

by Stinson, Douglas R.

Publisher: Boca Raton : CRC Press, c1995Availability: Items available for loan: Central Library (CL)Call number: 005.82 STI (4).
Applied cryptography: protocols, algorithms and source code in C Bruce Schneier

by Bruce Schneier.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Availability: Items available for loan: Central Library (CL)Call number: 005.82 SCH (12). Checked out (1).
Coding theory: a first course a first course San Ling, Chaoping Xing

by Ling, San | Xing, Chaoping, 1963-.

Publisher: Cambridge : Cambridge University Press, 2004Availability: Items available for loan: Central Library (CL)Call number: 003.54 LIN (1).
Foundations of cryptography Oded Goldreich.

by Goldreich, Oded.

Publisher: Cambridge : Cambridge University Press, 2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 GOL (1).
Introduction to cryptography Johannes Buchmann

by Buchmann, Johannes.

Publisher: New York : , Springer-Verlag c2001Availability: No items available : Checked out (1).
Modern Cryptography: Theory and Practice Wenbo Mao

by Mao, Wenbo.

Publisher: New Delhi : Pearson Education Inc. , c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 MAO (2).
Cryptography for Internet and database applications : developing secret and public key techniques with Java Nick Galbreath.

by Galbreath, Nick.

Publisher: New York : John Wiley & Sons, cop. 2002Availability: Items available for loan: Central Library (CL)Call number: 005.8 GAL (1).
Coding for data and computer communications electronic resource David salomon.

by Salomon, D | MyiLibrary.

Publisher: New York, NY : Springer, c2005Online access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 SAL (5).
User's guide to cryptography and standards Alexander W. Dent, Chris J. Mitchell.

by Dent, Alexander W | Mitchell, Chris.

Publisher: Boston : Artech House, c2005Other title: Cryptography and standards.Availability: Items available for loan: Central Library (CL)Call number: 005.8 DEN (1).
Authentication codes and combinatorial designs Dingyi Pei.

by Pei, Dingyi.

Publisher: Boca Raton, FL : Chapman & Hall/CRC, 2006Online access: Table of contents only | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.82 PEI (1).
Elliptic curves in cryptography I.F. Blake, G. Seroussi, and N.P. Smart.

by Blake, Ian F | Seroussi, G, 1955- | Smart, Nigel P, 1967-.

Publisher: New York : Cambridge University Press, 1999Online access: Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.82 BLA (1).
.NET security and cryptography Peter Thorsteinson

by Thorsteinson, Peter | G. Gnana Arun Ganesh.

Publisher: New Delhi . Pearson Education Inc., : c2004Availability: Items available for loan: Central Library (CL)Call number: 005.8 THO (3).
Quantum communications and cryptography Alexander V. Sergienko.

by Sergienko, Alexander V.

Publisher: Boca Raton, FL : Taylor & Francis, 2006Online access: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
Quantum communications and cryptography Alexander V. Sergienko, editor

by Sergienko, Alexander V.

Publisher: Boca Raton, FL : Taylor & Francis, 2006Other title: Quantum communications and cryptography [electronic resource].Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 005.8 SER (1).
Practical cryptography Niels Ferguson, Bruce Schneier.

by Schneier, Bruce | Schneier, Bruce, 1963-.

Publisher: New York : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Central Library (CL)Call number: 005.8 SCH (7).
Cryptography: a very short introduction Fred Piper

by Piper, Fred C | Sean.Murphy.

Publisher: Oxford ; New York : Oxford University Press 2002Availability: Items available for loan: Central Library (CL)Call number: 652.8 PIP (1).
Cryptographic algorithms on reconfigurable hardware Francisco Rodriguez-Henriquez

by Rodriquez-Henriquez, Francisco.

Publisher: New York : Springer, c2006Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 ROD (2).
Introduction to cryptography with Java applets David Bishop.

by Bishop, David.

Publisher: New Delhi: Narosa Publishing House, 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 BIS (2).
Cryptography, information theory, and error-correction: a handbook for the 21st century a handbook for the 21st century Aiden A. Bruen, Mario A. Forcinito.

by Bruen, Aiden A | Forcinito, Mario, 1962-.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRU (1).
Introduction to modern cryptography Jonathan Katz, Yehuda Lindell.

by Katz, Jonathan | Lindell, Yehuda.

Publisher: Boca Raton : Chapman & Hall/CRC, c2008Online access: Table of contents only | Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAT (1).
Contemporary cryptography Rolf Oppliger.

by Oppliger, Rolf.

Publisher: Boston : Artech House, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.82 OPP (1).
The code book: the secret history of codes and codebreaking the secret history of codes and codebreaking Simon Singh

by Singh, Simon.

Edition: Paperback ed. Publisher: London : Fourth estate, 2000Availability: Items available for loan: Central Library (CL)Call number: 652.8 SIN (1).
Introduction to cryptography : principles and applications Hans Delfs, Helmut Knebl.

by Delfs, Hans | Knebl, Helmut.

Publisher: Berlin ; New York : Springer, c2002Availability: No items available : Checked out (1).
Network security essentials: applications and standards applications and standards William Stallings

by Stallings, William.

Edition: 3. ed. Publisher: Upper Saddle River, N. J. : Prentice Hall, cop. 2007Availability: Items available for loan: Central Library (CL)Call number: 005.8 STA (7).
Handbook of applied cryptography Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone

by Menezes, A. J | Van Oorschot, Paul C | Vanstone, Scott A.

Publisher: Boca Raton : CRC Press, c1997Other title: Applied cryptography.Availability: Items available for reference: Central Library (CL) Not for loanCall number: 005.8 MEN (3). :
Computer security and cryptography Alan G. Konheim.

by Konheim, Alan G.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2007Availability: Items available for loan: Central Library (CL)Call number: 005.8 KON (3).
Codes and ciphers: Julius Caesar, the Enigma and the internet Julius Caesar, the Enigma and the internet R.F. Churchhouse.

by Churchhouse, R. F.

Publisher: Cambridge ; New York : Cambridge University Press, 2002Availability: Items available for loan: Central Library (CL)Call number: 652.8 CHU (2).
Introduction to cryptography and network security Behrouz A. Forouzan.

by Forouzan, Behrouz A.

Publisher: Boston : McGraw-Hill Higher Education, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 005.8 FOR (3).
The Code Book The Scienceof Secrecy from Ancient Egypt to Quantum Cryptography Simon Singh

by Simon Singh.

Publisher: United States of America Anchor Books New York 1999Availability: Items available for loan: Central Library (CL)Call number: 652.809 SIN (1).
The Code Book The evolution of secrecy from Mary Queen of Scots to quantum cryprography Singh, Simon

by Singh, Simon.

Publisher: USA Doubleday 1999Availability: Items available for loan: Central Library (CL)Call number: 652.809 SIN (1).
Cryptography and network security

by Kahate, Atul | Atul Kahate.

Edition: 2nd edMaterial type: Text Text Publisher: New Delhi McGraw-Hill Higher Education, 2003Availability: Items available for loan: Central Library (CL)Call number: 005.8 KAH (3).
Cryptography and network security

by Forouzan, Behrouz A.

Edition: 2nd ed.Material type: Text Text Publisher: New Delhi, India McGraw Hill 2010Availability: No items available : Checked out (1).
Cryptography : theory and practice

by Stinson, Douglas R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: USA Chapman & Hall/CRC c2002Online access: Table of contents only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.8STI (2), Central Library (CL)Call number: 005.82STI (1).
Differential cryptanalysis of the data encryption standard

by Biham,Eli & Shamir,Adi.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York Springer- verlag c1993Online access: Table of content only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.82BIH (2).
Guide to elliptic curve cryptography

by Hankerson, Darrel R.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New - York Springer c2004Online access: Table of content only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.8HAN (2).
The Classic Elements of Cryptanalysis with new added Problems for Solver

by Friedman, William F.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: USA Aegean park press c1976Online access: Table of content only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.54FRI (2).
The Index of Coincidence and its Applications in Cryptanalysis

by Friedman, William F.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: California Aegean Park Press c1987Online access: Table of Content Only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 005.54FRI (2).
Cryptanalysis of the Hagelin Cryptograph

by Barker, Wayne G.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: California Aegean Park Press c1977Online access: Table of Content Only Availability: Items available for loan: NUST Baluchistan Campus (NBC)Call number: 001.54BAR (2).
Elliptic curves and their applications to cryptography : an introduction / by Andreas Enge.

by Enge, Andreas.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Kluwer Academic, 1999Online access: Publisher description | Table of contents only Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 ENG (1).
Introduction to cryptography : principles and applications / Hans Delfs, Helmut Knebl.

by Delfs, Hans | Knebl, Helmut.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 2002Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 (1).
Cryptography demystified / John E. Hershey.

by Hershey, J. E. (John E.).

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : McGraw-Hill, c2003Online access: Click here to access online | Table of contents | Publisher description Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 HER (1).
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / Bart Preneel, Vincent Rijmen (eds.).

by Preneel, Bart | Preneel, Bart, 1963- | Rijmen, Vincent, 1970-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Berlin ; New York : Springer, 1998Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 PRE (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, c1996Online access: Click here to access online | Publisher description | Table of Contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SCH (2).
Guide to elliptic curve cryptography Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.

by Hankerson, Darrel R | Vanstone, Scott A | Menezes, A. J. (Alfred J.), 1965-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Springer, 2003Online access: Publisher description Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 HAN (1).
Contemporary cryptology : the science of information integrity edited by Gustavus J. Simmons.

by Simmons Gustavas J | Simmons, Gustavus J | Institute of Electrical and Electronics Engineers.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Piscataway, NJ : IEEE Press, c1992Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SIM (1).
Cryptographic algorithms on reconfigurable hardware Francisco Rodriguez-Henriquez

by Fenriquez Francisco Rodriguez | Rodriquez-Henriquez, Francisco.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Springer, c2006Online access: Publisher description | Table of contents only Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 HEN (1).
Applied cryptology, cryptographic protocols, and computer security models. Richard A. DeMillo

by DeMillo Richard A.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Providence, R.I. : American Mathematical Society, c1983Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 DEM (1).
RSA Security's official guide to cryptography / Steve Burnett and Stephen Paine.

by Burnett, Steve | Paine, Stephen | RSA Security.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Osborne/McGraw-Hill, 2001Other title: Official guide to cryptography.Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 BUR (1).
The codebreakers / David Kahn.

by Kahn, David.

Edition: [Abridged] ed. Publisher: London : Weidenfeld and Nicolson, 1974Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,KAH (1). :
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.