Search Results for Data encryption (Computer science) - Narrowed by: Mathematics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dSUBJECT$002509Subject$002509Mathematics.$002509Mathematics.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?2025-02-25T10:44:49ZAdvances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Crittografia nel Paese delle Meraviglieent://SD_ILS/0/SD_ILS:2046512025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Venturi, Daniele. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Prime Numbers and Computer Methods for Factorizationent://SD_ILS/0/SD_ILS:1683742025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Riesel, Hans. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-8176-8298-9">http://dx.doi.org/10.1007/978-0-8176-8298-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935242025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Alpcan, Tansu. editor. Buttyán, Levente. editor. Baras, John S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:1916052025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Buchmann, Johannes. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11186-0">http://dx.doi.org/10.1007/978-3-642-11186-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gröbner Bases, Coding, and Cryptographyent://SD_ILS/0/SD_ILS:1895132025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Sala, Massimiliano. editor. Sakata, Shojiro. editor. Mora, Teo. editor. Traverso, Carlo. editor. Perret, Ludovic. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Post-Quantum Cryptographyent://SD_ILS/0/SD_ILS:1891062025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Bernstein, Daniel J. editor. Buchmann, Johannes. editor. Dahmen, Erik. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Finite Automata and Application to Cryptographyent://SD_ILS/0/SD_ILS:1880682025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Tao, Renji. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:1871602025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Buchmann, Johannes. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74452-8">http://dx.doi.org/10.1007/978-3-540-74452-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:1675452025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Random Curves Journeys of a Mathematicianent://SD_ILS/0/SD_ILS:1870492025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Koblitz, Neal. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Binary Quadratic Forms An Algorithmic Approachent://SD_ILS/0/SD_ILS:1849372025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Buchmann, Johannes. author. Vollmer, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:1850532025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Bauer, Friedrich L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:1694372025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Garcia, Arnaldo. editor. Stichtenoth, Henning. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:1519562025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Curtin, Matt. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Modern Number Theory Fundamental Problems, Ideas and Theoriesent://SD_ILS/0/SD_ILS:1815402025-02-25T10:44:49Z2025-02-25T10:44:49ZAuthor Manin, Yuri Ivanovic. author. Panchishkin, Alexei A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>