Search Results for Cryptography. - Narrowed by: Computational complexity. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCryptography.$0026qf$003dSUBJECT$002509Subject$002509Computational$002bcomplexity.$002509Computational$002bcomplexity.$0026ic$003dtrue$0026ps$003d300? 2024-11-06T00:49:38Z Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334022 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Iwama, Kazuo. editor.&#160;Kawano, Yasuhito. editor.&#160;Murao, Mio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334022.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35656-8">http://dx.doi.org/10.1007/978-3-642-35656-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday ent://SD_ILS/0/SD_ILS:335154 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Fischlin, Marc. editor.&#160;Katzenbeisser, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335154.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security: From Theory to Applications Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday ent://SD_ILS/0/SD_ILS:196428 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Naccache, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-28368-0">http://dx.doi.org/10.1007/978-3-642-28368-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196822 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Fischlin, Marc. editor.&#160;Buchmann, Johannes. editor.&#160;Manulis, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30057-8">http://dx.doi.org/10.1007/978-3-642-30057-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman ent://SD_ILS/0/SD_ILS:195100 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Goldreich, Oded. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22670-0">http://dx.doi.org/10.1007/978-3-642-22670-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195967 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Chen, Liqun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25516-8">http://dx.doi.org/10.1007/978-3-642-25516-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193796 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Dam, Wim. editor.&#160;Kendon, Vivien M. editor.&#160;Severini, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18073-6">http://dx.doi.org/10.1007/978-3-642-18073-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2011 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194024 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Catalano, Dario. editor.&#160;Fazio, Nelly. editor.&#160;Gennaro, Rosario. editor.&#160;Nicolosi, Antonio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19379-8">http://dx.doi.org/10.1007/978-3-642-19379-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194738 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Lopez, Javier. editor.&#160;Tsudik, Gene. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21554-4">http://dx.doi.org/10.1007/978-3-642-21554-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 &ndash; December 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195937 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Yang, Bo-Yin.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25405-5">http://dx.doi.org/10.1007/978-3-642-25405-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Cryptography &ndash; PKC 2010 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192187 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Nguyen, Phong Q. editor.&#160;Pointcheval, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13013-7">http://dx.doi.org/10.1007/978-3-642-13013-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192420 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13708-2">http://dx.doi.org/10.1007/978-3-642-13708-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings ent://SD_ILS/0/SD_ILS:193606 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Joye, Marc. editor.&#160;Miyaji, Atsuko. editor.&#160;Otsuka, Akira. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17455-1">http://dx.doi.org/10.1007/978-3-642-17455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190855 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Avanzi, Roberto Maria. editor.&#160;Keliher, Liam. editor.&#160;Sica, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04159-4">http://dx.doi.org/10.1007/978-3-642-04159-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191273 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Jacobson, Michael J. editor.&#160;Rijmen, Vincent. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05445-7">http://dx.doi.org/10.1007/978-3-642-05445-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:191500 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Parker, Matthew G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10868-6">http://dx.doi.org/10.1007/978-3-642-10868-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2009 Third International Conference Palo Alto, CA, USA, August 12-14, 2009 Proceedings ent://SD_ILS/0/SD_ILS:190581 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Shacham, Hovav. editor.&#160;Waters, Brent. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03298-1">http://dx.doi.org/10.1007/978-3-642-03298-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography 4th Workshop,TQC 2009, Waterloo, Canada, May 11-13, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191450 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Childs, Andrew. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10698-9">http://dx.doi.org/10.1007/978-3-642-10698-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189693 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Reingold, Omer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-00457-5">http://dx.doi.org/10.1007/978-3-642-00457-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188159 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Canetti, Ran. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78524-8">http://dx.doi.org/10.1007/978-3-540-78524-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Quantum Computation, Communication, and Cryptography Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189241 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Kawano, Yasuhito. editor.&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89304-2">http://dx.doi.org/10.1007/978-3-540-89304-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188716 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Galbraith, Steven D. editor.&#160;Paterson, Kenneth G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-85538-5">http://dx.doi.org/10.1007/978-3-540-85538-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186107 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Vadhan, Salil P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70936-7">http://dx.doi.org/10.1007/978-3-540-70936-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187827 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Galbraith, Steven D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2007 First International Conference, Tokyo, Japan, July 2-4, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186868 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Okamoto, Tatsuaki. editor.&#160;Okamoto, Eiji. editor.&#160;Okamoto, Takeshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73489-5">http://dx.doi.org/10.1007/978-3-540-73489-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183489 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Halevi, Shai. editor.&#160;Rabin, Tal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11681878">http://dx.doi.org/10.1007/11681878</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:184267 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Ytrehus, &Oslash;yvind. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11779360">http://dx.doi.org/10.1007/11779360</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182373 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Kilian, Joe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b106171">http://dx.doi.org/10.1007/b106171</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183360 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Smart, Nigel P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11586821">http://dx.doi.org/10.1007/11586821</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The LLL Algorithm Survey and Applications ent://SD_ILS/0/SD_ILS:190278 2024-11-06T00:49:38Z 2024-11-06T00:49:38Z Author&#160;Nguyen, Phong Q. editor.&#160;Vall&eacute;e, Brigitte. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02295-1">http://dx.doi.org/10.1007/978-3-642-02295-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>