Search Results for Public key cryptography. - Narrowed by: Coding theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPublic$002bkey$002bcryptography.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ps$003d300? 2026-02-28T00:18:30Z RSA and public-key cryptography ent://SD_ILS/0/SD_ILS:543985 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Mollin, Richard A., 1947, author.<br/>Preferred Shelf Number&#160;QA268 .M655 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420035247">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:483055 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486955 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Lin, Dongdai. editor.&#160;Sako, Kazue. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Primality Testing and Integer Factorization in Public-Key Cryptography ent://SD_ILS/0/SD_ILS:167452 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77268-4">http://dx.doi.org/10.1007/978-0-387-77268-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic curves in cryptography ent://SD_ILS/0/SD_ILS:544162 2026-02-28T00:18:30Z 2026-02-28T00:18:30Z Author&#160;Ling, San, 1964, author.&#160;Wang, Huaxiong.&#160;Xing, Chaoping, 1963-<br/>Preferred Shelf Number&#160;QA268 .L545 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420079470">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>