Search Results for Computer Security - Narrowed by: English - Computer security. - Number theory.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Number$002btheory.$002509Number$002btheory.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300$0026isd$003dtrue?
2024-09-09T16:09:41Z
Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis
ent://SD_ILS/0/SD_ILS:398995
2024-09-09T16:09:41Z
2024-09-09T16:09:41Z
Author Nakahara Jr., Jorge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2024-09-09T16:09:41Z
2024-09-09T16:09:41Z
Author Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>