Search Results for Mathematics. - Narrowed by: SpringerLink (Online service) - E-Book - Online Library - Electronic Library - Data encryption (Computer science).SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematics.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AELEKKUTUPH$002509Electronic$002bLibrary$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?2024-09-07T13:28:36ZAn Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:1675452024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Silverman, J.H. author. Pipher, Jill. author. Hoffstein, Jeffrey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Binary Quadratic Forms An Algorithmic Approachent://SD_ILS/0/SD_ILS:1849372024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Buchmann, Johannes. author. Vollmer, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:1688832024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Kowalik, Janusz S. editor. Gorski, Janusz. editor. Sachenko, Anatoly. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4849592024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography, Security and Privacyent://SD_ILS/0/SD_ILS:4870702024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Jajodia, Sushil. editor. Samarati, Pierangela. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Code-Based Cryptography 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18–19, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4864262024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Baldi, Marco. editor. (orcid)0000-0002-8754-5526 Persichetti, Edoardo. editor. (orcid)0000-0002-1895-377X Santini, Paolo. editor. (orcid)0000-0003-0631-3668 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-25922-8">https://doi.org/10.1007/978-3-030-25922-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4854732024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Jürjens, Jan. editor. Piessens, Frank. editor. Bielova, Nataliia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-04897-0">https://doi.org/10.1007/978-3-319-04897-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedingsent://SD_ILS/0/SD_ILS:4858422024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Chen, Liqun. editor. Mitchell, Chris. editor. (orcid)0000-0002-6118-0055 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part IIent://SD_ILS/0/SD_ILS:4889562024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4889752024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Lindell, Yehuda. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4890162024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sarkar, Palash. editor. Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Homomorphic Encryption and Applicationsent://SD_ILS/0/SD_ILS:4857612024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Yi, Xun. author. Paulet, Russell. author. Bertino, Elisa. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12229-8">https://doi.org/10.1007/978-3-319-12229-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:4857762024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Joux, Antoine. editor. Youssef, Amr. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:4882332024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Donovan, Peter. author. Mack, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:4872742024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Schmidt, Kai-Uwe. editor. Winterhof, Arne. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-12325-7">https://doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3345872024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Johansson, Thomas. editor. Nguyen, Phong Q. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334587.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthdayent://SD_ILS/0/SD_ILS:3351542024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Fischlin, Marc. editor. Katzenbeisser, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335154.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42001-6">http://dx.doi.org/10.1007/978-3-642-42001-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Quantum Attacks on Public-Key Cryptosystemsent://SD_ILS/0/SD_ILS:3308282024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Yan, Song Y. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(330828.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7722-9">http://dx.doi.org/10.1007/978-1-4419-7722-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part Ient://SD_ILS/0/SD_ILS:3348812024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334881.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part IIent://SD_ILS/0/SD_ILS:3348882024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Canetti, Ran. editor. Garay, Juan A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334888.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40084-1">http://dx.doi.org/10.1007/978-3-642-40084-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Information and Computer Security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedingsent://SD_ILS/0/SD_ILS:3350982024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sakiyama, Kazuo. editor. Terada, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335098.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41383-4">http://dx.doi.org/10.1007/978-3-642-41383-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3351972024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Stam, Martijn. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335197.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Prime Numbers and Computer Methods for Factorizationent://SD_ILS/0/SD_ILS:1683742024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Riesel, Hans. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-8176-8298-9">http://dx.doi.org/10.1007/978-0-8176-8298-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Crittografia nel Paese delle Meraviglieent://SD_ILS/0/SD_ILS:2046512024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Venturi, Daniele. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-88-470-2481-6">http://dx.doi.org/10.1007/978-88-470-2481-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935242024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Alpcan, Tansu. editor. Buttyán, Levente. editor. Baras, John S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:1916052024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Buchmann, Johannes. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11186-0">http://dx.doi.org/10.1007/978-3-642-11186-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Post-Quantum Cryptographyent://SD_ILS/0/SD_ILS:1891062024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Bernstein, Daniel J. editor. Buchmann, Johannes. editor. Dahmen, Erik. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88702-7">http://dx.doi.org/10.1007/978-3-540-88702-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Finite Automata and Application to Cryptographyent://SD_ILS/0/SD_ILS:1880682024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Tao, Renji. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78257-5">http://dx.doi.org/10.1007/978-3-540-78257-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gröbner Bases, Coding, and Cryptographyent://SD_ILS/0/SD_ILS:1895132024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sala, Massimiliano. editor. Sakata, Shojiro. editor. Mora, Teo. editor. Traverso, Carlo. editor. Perret, Ludovic. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-93806-4">http://dx.doi.org/10.1007/978-3-540-93806-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Random Curves Journeys of a Mathematicianent://SD_ILS/0/SD_ILS:1870492024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Koblitz, Neal. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Einführung in die Kryptographieent://SD_ILS/0/SD_ILS:1871602024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Buchmann, Johannes. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74452-8">http://dx.doi.org/10.1007/978-3-540-74452-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and Security Informatics Techniques and Applicationsent://SD_ILS/0/SD_ILS:1857382024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Chen, Hsinchun. editor. Yang, Christopher C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:1850532024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Bauer, Friedrich L. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:1694372024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Garcia, Arnaldo. editor. Stichtenoth, Henning. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:1519562024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Curtin, Matt. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Modern Number Theory Fundamental Problems, Ideas and Theoriesent://SD_ILS/0/SD_ILS:1815402024-09-07T13:28:36Z2024-09-07T13:28:36ZAuthor Manin, Yuri Ivanovic. author. Panchishkin, Alexei A. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>