|
1.
|
Cryptography in C and C++
by Welschenbach, Michael;
Kramer, David.
Edition: 1st ed.Publisher: New York Springer-Verlag 2001Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/WEL/2001] (2).
|
|
2.
|
Cryptography for security and privacy in cloud computing
by Rass, Stefan;
Slamanig, Daniel.
Edition: Ist ed.Publisher: Boston: Artech House, 2014Availability: Items available for loan: Central Library, BUET [005.82/RAS/2014] (1).
|
|
3.
|
Cryptography : theory and practice
by Stinson, Douglas R.
Edition: 3rd ed.Publisher: New York : Chapman & Hall, 2006Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/STI/2006] (2).
|
|
4.
|
Introduction to modern cryptography
by Katz, Jonathan;
Lindell, Yehuda.
Edition: 1st ed.Publisher: Boca Raton : Chapman & Hall/CRC, 2008Online Access: Click here to access online | Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/KAT/2008] (2).
|
|
5.
|
Quantum communications and cryptography
by Sergienko, Alexander V.
Edition: 1st ed.Publisher: London Taylor & Francis 2006Availability: Items available for loan: Central Library, BUET [005.82/SER/2006] (2).
|
|
6.
|
Applied cryptography protocols, algorithms, and source code in C
by Schneier, Bruce.
Edition: 2nd ed.Publisher: Indianapolis John Wiley & Sons 1996Availability: Items available for loan: Central Library, BUET [005.82/SCH/1996] (1). Checked out (1).
|
|
7.
|
Internet cryptography
by Smith, Richard E.
Edition: 1st ed. Publisher: Reading Addison-Wesley 1997Availability: Items available for loan: Central Library, BUET [005.82/SMI/2000] (1).
|
|
8.
|
Encyclopedia of cryptography and security
by Tilborg, Henk C. A. van.
Edition: 1st ed.Publisher: New York Springer 2005Availability: Items available for loan: Central Library, BUET [005.8203/TIL/2005] (1).
|
|
9.
|
Handbook of applied cryptography
by Menezes, Alfred J;
Van Oorschot, Paul C;
Vanstone, Scott A.
Edition: 1st ed.Publisher: Boca Raton CRC Press 2014Availability: Items available for loan: Central Library, BUET [005.8202/MEN/2014 ] (2).
|
|
10.
|
Applied cryptography protocols, algorithms and source code in C
by Schneier, Bruce.
Edition: 20th ed.Publisher: Indianapolis John Wiley & Sons 2015Availability: Items available for loan: Central Library, BUET [005.82/SCH/2015] (2).
|
|
11.
|
Introduction to number theory with cryptography
by Kraft, James S;
Washington, Lawrence C.
Edition: 1st ed.Publisher: London Taylor & Francis 2014Availability: Items available for loan: Central Library, BUET [512.81/KRA/2014] (2).
|
|
12.
|
Development of a computer aided learning tool for cryptography
by ShahidUllah Bhuiyan, Md.
Publisher: Dhaka Institute of Information and Communication Technology, BUET 2018Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/SHA/2018] (1).
|
|
13.
|
Design of a built-in-self-test implemented AES crypto processor ASIC
by Shazzatur Rahman, Md.
Publisher: Dhaka Institute of Information and Communication Technology, BUET 2020Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.82/SHA/2020] (1).
|
|
14.
|
Cryptonomicon
by Stephenson, Neal.
Edition: 1st ed.Publisher: New York Perennial 1999Availability: Items available for loan: Central Library, BUET [813.54/STE/1999] (1).
|