Search Results for - Narrowed by: E-Book - Electronic Library - 2013 - Computer software. - Data Structures, Cryptology and Information Theory. - Data encryption (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092013$0025092013$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-17T22:38:13Z Quantum Attacks on Public-Key Cryptosystems ent://SD_ILS/0/SD_ILS:330828 2024-07-17T22:38:13Z 2024-07-17T22:38:13Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(330828.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-07-17T22:38:13Z 2024-07-17T22:38:13Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>