Your search returned 14 results. Subscribe to this search

|
1. Cryptography in C and C++

by Welschenbach, Michael; Kramer, David.

Edition: 1st ed.Publisher: New York Springer-Verlag 2001Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/WEL/2001] (2).

2. Cryptography for security and privacy in cloud computing

by Rass, Stefan; Slamanig, Daniel.

Edition: Ist ed.Publisher: Boston: Artech House, 2014Availability: Items available for loan: Central Library, BUET [005.82/RAS/2014] (1).

3. Cryptography : theory and practice

by Stinson, Douglas R.

Edition: 3rd ed.Publisher: New York : Chapman & Hall, 2006Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/STI/2006] (2).

4. Introduction to modern cryptography

by Katz, Jonathan; Lindell, Yehuda.

Edition: 1st ed.Publisher: Boca Raton : Chapman & Hall/CRC, 2008Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/KAT/2008] (2).

5. Quantum communications and cryptography

by Sergienko, Alexander V.

Edition: 1st ed.Publisher: London Taylor & Francis 2006Availability: Items available for loan: Central Library, BUET [005.82/SER/2006] (2).

6. Applied cryptography protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Publisher: Indianapolis John Wiley & Sons 1996Availability: Items available for loan: Central Library, BUET [005.82/SCH/1996] (1). Checked out (1).

7. Internet cryptography

by Smith, Richard E.

Edition: 1st ed. Publisher: Reading Addison-Wesley 1997Availability: Items available for loan: Central Library, BUET [005.82/SMI/2000] (1).

8. Encyclopedia of cryptography and security

by Tilborg, Henk C. A. van.

Edition: 1st ed.Publisher: New York Springer 2005Availability: Items available for loan: Central Library, BUET [005.8203/TIL/2005] (1).

9. Handbook of applied cryptography

by Menezes, Alfred J; Van Oorschot, Paul C; Vanstone, Scott A.

Edition: 1st ed.Publisher: Boca Raton CRC Press 2014Availability: Items available for loan: Central Library, BUET [005.8202/MEN/2014 ] (2).

10. Applied cryptography protocols, algorithms and source code in C

by Schneier, Bruce.

Edition: 20th ed.Publisher: Indianapolis John Wiley & Sons 2015Availability: Items available for loan: Central Library, BUET [005.82/SCH/2015] (2).

11. Introduction to number theory with cryptography

by Kraft, James S; Washington, Lawrence C.

Edition: 1st ed.Publisher: London Taylor & Francis 2014Availability: Items available for loan: Central Library, BUET [512.81/KRA/2014] (2).

12. Development of a computer aided learning tool for cryptography

by ShahidUllah Bhuiyan, Md.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2018Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/SHA/2018] (1).

13. Design of a built-in-self-test implemented AES crypto processor ASIC

by Shazzatur Rahman, Md.

Publisher: Dhaka Institute of Information and Communication Technology, BUET 2020Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/SHA/2020] (1).

14. Cryptonomicon

by Stephenson, Neal.

Edition: 1st ed.Publisher: New York Perennial 1999Availability: Items available for loan: Central Library, BUET [813.54/STE/1999] (1).