Arama Sonu&ccedil;lar&#305; Cryptography - Daralt&#305;lm&#305;&#351;: Public key cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCryptography$0026qf$003dSUBJECT$002509Konu$002509Public$002bkey$002bcryptography.$002509Public$002bkey$002bcryptography.$0026ic$003dtrue$0026ps$003d300?dt=list 2025-03-24T17:41:41Z Public key cryptography applications and attacks ent://SD_ILS/0/SD_ILS:249342 2025-03-24T17:41:41Z 2025-03-24T17:41:41Z Yazar&#160;Batten, Lynn Margaret.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Elliptic Curve Cryptography ent://SD_ILS/0/SD_ILS:236058 2025-03-24T17:41:41Z 2025-03-24T17:41:41Z Yazar&#160;Blake, Ian F..&#160;Seroussi, Gadiel.&#160;Smart, Nigel P..<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1017/CBO9780511546570">Access by subscription</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> RSA and public-key cryptography ent://SD_ILS/0/SD_ILS:285855 2025-03-24T17:41:41Z 2025-03-24T17:41:41Z Yazar&#160;Mollin, Richard A., 1947-<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420035247">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptanalysis of RSA and its variants ent://SD_ILS/0/SD_ILS:291418 2025-03-24T17:41:41Z 2025-03-24T17:41:41Z Yazar&#160;Hinek, M. Jason.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781420075199">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Access control, authentication, and public key infrastructure ent://SD_ILS/0/SD_ILS:271243 2025-03-24T17:41:41Z 2025-03-24T17:41:41Z Yazar&#160;Ballad, Bill.&#160;Ballad, Tricia.&#160;Banks, Erin K.<br/>Yer Numaras&#305;&#160;TK5105.59 B353 2011<br/>Format:&#160;Kitap<br/>Durum&#160;Beytepe K&uuml;t&uuml;phanesi~1<br/> Internet and Wireless Security ent://SD_ILS/0/SD_ILS:247682 2025-03-24T17:41:41Z 2025-03-24T17:41:41Z Yazar&#160;Temple, Robert, ed.&#160;Regnault, John, ed.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1049/PBBT004E">http://dx.doi.org/10.1049/PBBT004E</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>