opac header image

Refine your search

Your search returned 70 results.

Not what you expected? Check for suggestions
Sort
Results
41.
Disappearing cryptography: information hiding: steganography & watermarking P. Wayner

by Wayner, P.

Edition: 3rd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Amsterdam Elsevier 2009Availability: Items available for loan: NISER LIBRARY (1)Call number: 003.29 WAY-D.

42.
Cryptography:an introduction edited by V V Yaschenko

by Yaschenko, VV.

Series: Student mathematical library vol 18Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: USA American mathematical society 2002Availability: Items available for loan: NISER LIBRARY (1)Call number: 003.26:510 YAS-C.

43.
Elliptic curves number theory and cryptography LC Washington

by Washington, LC.

Series: Discrete mathematics and its applicationsEdition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC 2008Availability: Items available for loan: NISER LIBRARY (1)Call number: 514.135 WAS-E.

44.
Course in number theory and cryptography Neal Koblitz

by Koblitz, N.

Edition: 2nd. ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York Springer 2008Availability: Items available for loan: NISER LIBRARY (1)Call number: 511:003.26 KOB-C .

45.
Cryptography and network security: principles and practices William Stallings

by Stallings, W.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New Delhi Pearson 2009Availability: Items available for loan: NISER LIBRARY (2)Call number: 003.26 STA-C, ... Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 003.26 STA-C.

46.
Understanding and applying cryptography and data security Adam J. Elbirt

by Elbirt, AJ.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton Crc 2009Availability: Items available for loan: NISER LIBRARY (1)Call number: 003.26:510 ELB-U.

47.
Introduction to cryptography: with mathematical foundations and computer implementations Alexander Stanoyevitch

by Stanoyevitch, Alexander.

Series: Discrete mathematics and its applicationsMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC 2011Availability: Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 003.26:510 STA-I.

48.
Applied cryptography: protocols, algorithms, and source code in c Bruce Schneier

by Schneier, Bruce.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York John Wiley 1996Availability: Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 003.26:510 SCH-A.

49.
Codes, ciphers and secret writing Martin Gardner

by Gardner, Martin.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York Dover 1972Availability: Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 003.26 GAR-C.

50.
Introduction to cryptography with open-source software Alasdair McAndrew

by McAndrew, Alasdair.

Series: Distrete mathematics and its applicationsMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC 2011Availability: Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 004.056.54 MCA-I.

51.
Crytography and network security principles and practice

by Stallings William.

Edition: 6th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New Delhi Pearson 2014Availability: Not available: NISER LIBRARY: Checked out (1).

52.
Introduction to modern cryptography

by Katz, J | Lindell, Y.

Series: Chapman & Hall/ CRC cryptography and network securityMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC 2015Availability: Not available: NISER LIBRARY: Checked out (1).

53.
Handbook of applied cryptography

by Menezes, Alfred J | Oorschot, Paul C Van | Rosen, Kenneth H.

Series: Discrete mathematics and its applicationMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC Press 2014Availability: Not available: NISER LIBRARY: Checked out (1).

54.
Cryptographic boolean functions and applications

by Cusick, T.W | Stanica, Pantelimon.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Amsterdam AP 2009Availability: Not available: NISER LIBRARY: Checked out (1).

55.
Signal design for good correlation: for wireless communication, cryptography and radar

by Golomb, S.W.

Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Cambridge CUP 2005Availability: Items available for loan: NISER LIBRARY (1).

56.
Algorithmic arithmetic, geometry, and coding theory :14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, France /

by Editied by Ballet Stephane | Perret, M | Zaytsev, Alexey.

Series: Contemporary mathematics,vol. 637Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Providence AMS 2013Availability: Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 519.711 BAL-A.

57.
Introduction to modern cryptography

by Katz, J | Lindell, Y.

Series: Chapman & Hall/ CRC cryptography and network securityMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC 2015Availability: Items available for loan: SMS Library (1)Call number: 519.6:003.26 KAT-I.

58.
Boolean functions and their applications in cryptography

by Wu, Chuan-Kun | Feng, Dengguo.

Series: Advances in computer science and technologyMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: New York Springer 2016Availability: Items available for loan: SMS Library (1)Call number: 519.7 WU-B.

59.
Arithmetic, geometry, cryptography, and coding theory: 15th international conference on arithmetic, geometry, cryptography and coding theory, may 18-22, 2015, CIRM, Luminy, France

by Edited by Bassa, Alp | Couvreur, Alain | Kohel, David.

Series: Contemporary mathematics 686Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Providence American Mathematical Society 2017Availability: Items available for reference: NISER LIBRARY: R (REFERENCE) (1)Call number: 512.72 BAS-A.

60.
Introduction to modern cryptography

by Katz, J | Lindell, Y.

Series: Chapman & Hall/ CRC cryptography and network securityMaterial type: Text Text; Format: print ; Literary form: Not fiction Language: English Publication details: Boca Raton CRC 2015Availability: Items available for loan: NISER LIBRARY (5)Call number: 003.26:510 KAT-I, ...

Pages
© 2024 Copyright: Customised and Maintained by Central Library NISER

Central Library, NISER Library Building, PO-Jatni, Khurda, Odisha - 752050, India | Email: libniser@niser.ac.in Phone: +91-674-2494171

Powered by Koha