Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Cryptography.
Author
Include
Exclude
SpringerLink (Online service)
(13)
Takagi, Tsuyoshi. editor.
(5)
Bhasin, Shivam. editor.
(3)
Peyrin, Thomas. editor.
(3)
Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983
(2)
Cheon, Jung Hee. editor.
(2)
Mukhopadhyay, Sourav. editor.
(2)
Picek, Stjepan. editor.
(2)
Rebeiro, Chester. editor.
(2)
Stănică, Pantelimon. editor. (orcid)0000-0002-8622-7120
(2)
Choudhury, Ashish. author.
(1)
Deneuville, Jean-Christophe. editor. (orcid)0000-0002-5128-6729
(1)
Güneysu, Tim. author.
(1)
Horlemann, Anna-Lena. editor. (orcid)0000-0003-2685-2343
(1)
Paar, Christof. author.
(1)
Patra, Arpita. author. (orcid)0000-0002-8036-4407
(1)
Pelzl, Jan. author.
(1)
Roche, Thomas. editor.
(1)
Weger, Violetta. editor. (orcid)0000-0001-9186-2885
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(13)
Publication Date
Include
Exclude
-
2024
(4)
2025
(4)
2017
(3)
2016
(2)
Subject
Include
Exclude
Cryptology.
(13)
Data encryption (Computer science).
(13)
Computer science -- Mathematics.
(11)
Mathematics of Computing.
(11)
Computer science.
(10)
Theory of Computation.
(9)
Data and Information Security.
(7)
Data protection.
(7)
Coding and Information Theory.
(6)
Coding theory.
(6)
Information theory.
(6)
Electronic data processing -- Management.
(5)
IT Operations.
(5)
Artificial intelligence.
(4)
Computer Communication Networks.
(3)
Computer networks .
(3)
Application software.
(1)
Blockchain.
(1)
Blockchains (Databases).
(1)
Computer System Implementation.
(1)
Computer and Information Systems Applications.
(1)
Computer networks -- Security measures.
(1)
Computer systems.
(1)
Mobile and Network Security.
(1)
Quantum Communications and Cryptography.
(1)
Quantum communication.
(1)
Theory and Algorithms for Application Domains.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
1:SPRINGER
Library
Include
Exclude
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
13 Results Found
1
2
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
13.
Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Author
Cheon, Jung Hee. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)
Preferred Shelf Number
ONLINE
Electronic Access
https://doi.org/10.1007/978-3-662-53887-6
Format:
Availability
Online Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2