Search Results for Number theory. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dNumber$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list
2026-03-14T23:30:36Z
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:609277
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:609291
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:609259
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis
ent://SD_ILS/0/SD_ILS:398995
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Nakahara Jr., Jorge. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Discrete dynamical systems and chaotic machines : theory and applications
ent://SD_ILS/0/SD_ILS:545715
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Bahi, Jacques Mohcine., author. Guyeux, Christophe.<br/>Preferred Shelf Number QA76.9 .A25 B344 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466554511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Cryptography, information theory, and error-correction : a handbook for the 21st century
ent://SD_ILS/0/SD_ILS:593044
2026-03-14T23:30:36Z
2026-03-14T23:30:36Z
Author Bruen, Aiden A., 1941- Forcinito, Mario, 1962-<br/>Preferred Shelf Number QA76.9 .A25 B79 2005<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118033296</a>
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119582397</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>