Arama Sonuçları Mathematical analysis - Daraltılmış: Coding theory.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMathematical$002banalysis$0026qf$003dSUBJECT$002509Konu$002509Coding$002btheory.$002509Coding$002btheory.$0026ps$003d300?dt=list2026-03-16T05:13:15ZMathematical Foundations for Side-Channel Analysis of Cryptographic Systemsent://SD_ILS/0/SD_ILS:6057272026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Cheng, Wei. author. (orcid)0000-0001-9433-7576 Guilley, Sylvain. author. (orcid)0000-0002-5044-3534 Rioul, Olivier. author. (orcid)0000-0002-8681-8916 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-64399-6">https://doi.org/10.1007/978-3-031-64399-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Hands-on Signals and Systems Theoryent://SD_ILS/0/SD_ILS:6038512026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Snopek, Kajetana Marta. author. (orcid)0000-0002-4920-0682 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-56081-1">https://doi.org/10.1007/978-3-031-56081-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Coding Theory in Optical Wireless Communication Systems Volume Ient://SD_ILS/0/SD_ILS:6045102026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Ke, Xizheng. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-19-9837-9">https://doi.org/10.1007/978-981-19-9837-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Coding Theory in Optical Wireless Communication Systems Volume IIent://SD_ILS/0/SD_ILS:6047742026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Ke, Xizheng. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-97-2382-9">https://doi.org/10.1007/978-981-97-2382-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:6161442026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Cheon, Jung Hee. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:6168102026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Cheon, Jung Hee. editor. Takagi, Tsuyoshi. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Why Cryptography Should Not Rely on Physical Attack Complexityent://SD_ILS/0/SD_ILS:5295572026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Krämer, Juliane. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Optical coding theory with primeent://SD_ILS/0/SD_ILS:5444492026-03-16T05:13:15Z2026-03-16T05:13:15ZYazar Kwong, Wing C., author. Yang, Guu-Chang, author.<br/>Yer Numarası TK5103.59 .K84 2013<br/>Elektronik Erişim <a href="https://www.taylorfrancis.com/books/9781466567818">Click here to view.</a><br/>Format: Kitap<br/>Durum Çevrimiçi Kütüphane~1<br/>