Your search returned 215 results.

Sort
Results
1.
Cryptology yesterday, today and tomorrow by Ciphes A. Deavours and [et al]. by
  • Deavours, Ciphes A. [et al]
Material type: Text Book
Publication details: Norwood Artech house Inc. 1987
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 652.8 N87.

2.
Course in number theory and cryptography by Neal Koblitz. by
  • Koblitz, Neal
Series: Graduate texts in mathematics ; 114
Material type: Text Book
Publication details: New York Springer-Verlag 1987
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 512.7 N87.

3.
Primality and cryptography by Evangelos Kranakis. by
  • Kranakis, Evangelos
Series: Wiley-Teubner series in computer science
Material type: Text Book
Publication details: Chichester Wiley 1986
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 001.5436 N86.

4.
Codes and cryptography /Dominic Welsh. by
  • Welsh, Dominic
Material type: Text Book
Publication details: Oxford Clarendon Press 1988
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 003.54 N884.

5.
Modern cryptology a tutorial by Gilles Brassard by
  • Brassard, Gilles
Series: Lecture notes in computer science ; 325
Material type: Text Book
Publication details: New York S-V 1988
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N88.

6.
Essential maths on BBC and electron computers basic routines for programming by Czes Kosniowski. by
  • Kosniowsky, Czes
Material type: Text Book
Publication details: London Sunshine Books 1984
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 510.285416 N84.

7.
Design of hashing algorithms /Josef Pieprzyk, Babak Sadeghiyan by
  • Pieprzyk, Josef
  • Sadeghiyan, Babak
Series: Lecture Notes in Computer Science
Material type: Text Book
Publication details: Berlin S-V 1993
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N93.

8.
Analysis and design and stream ciphers /Rainer A. Rueppel by
  • Rueppel, Rainer A
Material type: Text Book
Publication details: Berlin S-V 1986
Availability: Items available for reference: Computer Science and Automation: Not for loan (1)Call number: 652.8 N86.

9.
Network security: private communication in a public world by
  • by Charlie Kaufman, Radia Perlman and Mike Speciner
  • Kaufman, Charlie
  • Perlman, Radia
  • Speciner, Mike
Series: P-H Seriese in Computer Networking and Distributed Systems
Material type: Text Book
Publication details: Englewood Cliffs PTR Peintice Hall 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.82 N95.

10.
Building in big brother: the cryptographic policy debate /ed. by Lance J Hoffman by
  • Hoffman, Lance J
Material type: Text Book
Publication details: New York S-V 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 363.252 N95.

11.
Electronic access control systems: a new approach /by V. C. Janardhana Swamy by
  • Janardhana Swamy, V. C
Series: I.I.Sc, Dept of ECE, M.Sc., THESIS
Material type: Text Book
Publication details: Bangalore IISc 1994
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.82 N94 "THESIS".

12.
Advances in cryptology - CRYPTO '88 ed. by S. Goldwasser. by
  • Conference on the theory and application of cryptography( California, 1988)
Series: Lecture notes in computer science 403
Material type: Text Book
Publication details: Berlin Springer-Verlag 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N90.

13.
Advances in cryptology - CRYPTO '89 ed.by G. Brassard. by
  • Conference on advances in cryptology
  • Brassard,G.,ed
Series: Lecture notes in computer science No.435
Material type: Text Book
Publication details: New York Springer-Verlag 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N901.

14.
Advances in cryptology -Auscrypt '90 Proceedings ed by J Seberry and J Pieprzyk by
  • International Conference on cryptology (Sydney 1990)
  • Seberry, J., ed
  • Pieprzyk, J., ed
Series: Lecture Notes in Computer Science ; 453
Material type: Text Book
Publication details: Berlin Springer 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N904.

15.
Advances in cryptology - EUROCRYPT'93 Proceedings ed by Tor Helleseth by
  • Workshop on Cryptographic Techniques (Lofthus 1993)
  • Helleseth, Tor., ed
Series: Lecture Notes in Computer Science, 765
Material type: Text Book
Publication details: Berlin S-V 1994
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.82 N942.

16.
Advances in cryptology-EUROCRYPT '85 ed. by Franz Pichler. by
  • Workshop on the Theory and Applications of Cryptographic Techniques.( Linz, Austria,1985)
  • Pichler, Franz.,ed
Series: Lecture notes in computer science No.219
Material type: Text Book
Publication details: Berlin Springer-Verlag 1986
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.82 N86.

17.
Public-Key cryptography by Arto Salomaa. by
  • Salomaa, Arto
Series: EATCS monographs on theoretical computer science V.23
Material type: Text Book
Publication details: Berlin Springer-Verlag 1990
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N902.

18.
Course in number theory and cryptography. Neal Koblitz by
  • Koblitz, Neal
Series: Graduate texts in mathematics
Edition: 2nd ed.
Material type: Text Book
Publication details: New York Springer verlag 1994
Availability: Items available for reference: Aerospace Engineering: Not for loan (1)Call number: 512.7 N94.

19.
Chinese remainder theorem Applications in computing, coding, cryptography by Ding D Pei and A Salomaa by
  • Pei, Ding D
  • Salomaa, A
Material type: Text Book
Publication details: Singapore World Scientific 1996
Availability: Items available for reference: Computer Science and Automation: Not for loan (1)Call number: 511.6 N96.

20.
Cryptography a new dimension in computer data security :aguide for the design and implementation of secure systems by Carl H. Meyer and Stephen M. Matyas. by
  • Meyer, Carl H
  • Matyas, Stephen M
Material type: Text Book
Publication details: New York John Wiley 1982
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 001.5436 N82.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha