Your search returned 211 results.

Sort
Results
161.
Algorithmic Game Theory ed by Noam Nisan, et.al by
Material type: Text Text
Publication details: New York Cambridge University Press 2007
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 519.3 P07;1 (ECE).

162.
Modern cryptography, Probabilistic proofs and pseudorandomness by Oded Goldreich by Series: Algorithms and combinatorics ; vol 17
Material type: Text Text
Publication details: Berlin Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 511.6 N99 (CSA).

163.
Foundations of cryptography, Volume 1: Basic Tools by Oded Goldreich by
Material type: Text Text
Publication details: Cambridge Cambridge University Press 2001
Availability: Items available for loan: Computer Science and Automation (1)Call number: 652.8 P01.1 (CSA).

164.
Foundations of Cryptography. Volume II: Basic Applications by Oded Goldreich by
Material type: Text Text
Publication details: Cambridge Cambridge University Press 2004
Availability: Items available for loan: Computer Science and Automation (1)Call number: 652.8 P04.2 (CSA).

165.
Modern cryptography, probabilistic proofs, and pseudorandomness Oded Goldreich by Series: Algorithms and combinatorics ; 17
Material type: Text Text
Publication details: New York Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P (CSA).

166.
Modern cryptography probabilistic proofs and pseudo-randomness by by O Goldreich by
Material type: Text Text
Publication details: New York Springer 1999
Availability: Items available for loan: Computer Science and Automation (1)Call number: 511.6 N99;1 (CSA).

167.
Network security: Private communication in a public world by Charlie Kaufman, Radia Perlman and Mike Speciner by
Material type: Text Text
Publication details: New Jersey PTR Prentice Hall 1995
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N95;1.

168.
Algorithmic game theory ed by Noam Nisan., et al by
Material type: Text Text
Publication details: Cambridge Cambridge University Press 2007
Availability: Items available for loan: Computer Science and Automation (1)Call number: 519.3 P07;2 (CSA).

169.
Cryptography and network security : Principles and practice by William Stallings by
Edition: 6th ed
Material type: Text Text
Publication details: Noida Pearson 2014
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P143 (CSA).

170.
Algorithmic cryptanalysis by Antoine Joux by
Material type: Text Text
Publication details: Boca Raton CRC Press 2009
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P095 (CSA).

171.
Cryptanalysis of RSA and its variants by M Jason Hinek by
Material type: Text Text
Publication details: Boca Raton CRC Press 2010
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.82 P102 (CSA).

172.
Code book: The secret history of codes and code-breaking by Simon Singh by
Material type: Text Text
Publication details: London Fourth estate 1999
Availability: Items available for loan: Mathematics (1)Call number: 652.8 N99 (MA).

173.
Group theoretic cryptography by Maria Isabel Gonzalez Vasco and Rainer Steinwandt by Series: Chapman &​ Hall/​CRC cryptography and network security ;
Material type: Text Text
Publication details: Boca Raton CRC Press 2015
Availability: Items available for loan: Computer Science and Automation (1)Call number: 005.8 P155 (CSA).

174.
Foundations of cryptography Vol.1 : Basic tools by Oded Goldreich by
Material type: Text Text
Publication details: New Delhi Cambridge University Press 2001
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 652.8 P01.1;1 (ECE).

175.
Foundations of cryptography Vol 2: Basic Applications by Oded Goldreich by
Material type: Text Text
Publication details: New Delhi Cambridge University Press 2004
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 652.8 P04.2;1 (ECE).

176.
Applied cryptography: Protocols, algorithms, and source code in C by Bruice Schneier by
Edition: 2nd ed.
Material type: Text Text
Publication details: New Delhi Wiley 2006
Availability: Items available for loan: Electronic Systems Engineering (1)Call number: 005.82 P065 (ESE).

177.
Cryptography: theory and practice Douglas R. Stinson and Maura B. Paterson by
Edition: 4th
Material type: Text Text
Publication details: Boca Raton CRC Press 2019
Availability: Items available for loan: Electrical Communication Engineering (1)Call number: 005.82 P19(ECE).

178.
Beyond cryptographic routing: the echo protocol in the new era of exponential encryption by Mele Gasakis and Max Schmidt by
Material type: Text Text
Publication details: Verlag Druck 2018
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 GAS.

179.
Foundations of Cryptography: Volume 1, Basic Tools By Oded, Goldreich by
Material type: Text Text
Publication details: Cambridge Cambridge University Press 2001
Availability: Items available for loan: Computer Science and Automation (1)Call number: 652.8 ODE/F.

180.
Number theory and applications: proceedings of the International Conferences on Number Theory and Cryptography By S. D. Adhikari and B. Ramakrishnan. by
Material type: Text Text
Publication details: New Delhi Hindustan Book Agency 2009
Availability: Items available for loan: Centre for High Energy Physics (1)Call number: 512.7 ADH/N.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2024. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832