Search Results for - Narrowed by: Mathematics. - Data encryption (Computer science).SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Mathematics.$002509Mathematics.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300?2024-05-23T20:24:34ZRandom Curves Journeys of a Mathematicianent://SD_ILS/0/SD_ILS:5029852024-05-23T20:24:34Z2024-05-23T20:24:34Zby Koblitz, Neal. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5027322024-05-23T20:24:34Z2024-05-23T20:24:34Zby Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format: Electronic Resources<br/>An Introduction to Mathematical Cryptographyent://SD_ILS/0/SD_ILS:5019382024-05-23T20:24:34Z2024-05-23T20:24:34Zby Silverman, J.H. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format: Electronic Resources<br/>Decrypted Secrets Methods and Maxims of Cryptologyent://SD_ILS/0/SD_ILS:5118682024-05-23T20:24:34Z2024-05-23T20:24:34Zby Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format: Electronic Resources<br/>Binary Quadratic Forms An Algorithmic Approachent://SD_ILS/0/SD_ILS:5117902024-05-23T20:24:34Z2024-05-23T20:24:34Zby Buchmann, Johannes. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format: Electronic Resources<br/>Topics in Geometry, Coding Theory and Cryptographyent://SD_ILS/0/SD_ILS:5072292024-05-23T20:24:34Z2024-05-23T20:24:34Zby Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format: Electronic Resources<br/>Introduction to Modern Number Theory Fundamental Problems, Ideas and Theoriesent://SD_ILS/0/SD_ILS:5092902024-05-23T20:24:34Z2024-05-23T20:24:34Zby Manin, Yuri Ivanovic. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format: Electronic Resources<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:5041782024-05-23T20:24:34Z2024-05-23T20:24:34Zby Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:5044252024-05-23T20:24:34Z2024-05-23T20:24:34Zby Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Brute Force Cracking the Data Encryption Standardent://SD_ILS/0/SD_ILS:5046002024-05-23T20:24:34Z2024-05-23T20:24:34Zby Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format: Electronic Resources<br/>