Search Results for - Narrowed by: Mathematics. - Data encryption (Computer science). SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Mathematics.$002509Mathematics.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300? 2024-05-23T20:24:34Z Random Curves Journeys of a Mathematician ent://SD_ILS/0/SD_ILS:502985 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Koblitz, Neal. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74078-0">http://dx.doi.org/10.1007/978-3-540-74078-0</a><br/>Format:&#160;Electronic Resources<br/> Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502732 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Yang, Christopher C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format:&#160;Electronic Resources<br/> An Introduction to Mathematical Cryptography ent://SD_ILS/0/SD_ILS:501938 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Silverman, J.H. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77993-5">http://dx.doi.org/10.1007/978-0-387-77993-5</a><br/>Format:&#160;Electronic Resources<br/> Decrypted Secrets Methods and Maxims of Cryptology ent://SD_ILS/0/SD_ILS:511868 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Bauer, Friedrich L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-48121-8">http://dx.doi.org/10.1007/978-3-540-48121-8</a><br/>Format:&#160;Electronic Resources<br/> Binary Quadratic Forms An Algorithmic Approach ent://SD_ILS/0/SD_ILS:511790 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Buchmann, Johannes. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-46368-9">http://dx.doi.org/10.1007/978-3-540-46368-9</a><br/>Format:&#160;Electronic Resources<br/> Topics in Geometry, Coding Theory and Cryptography ent://SD_ILS/0/SD_ILS:507229 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Garcia, Arnaldo. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-5334-4">http://dx.doi.org/10.1007/1-4020-5334-4</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Modern Number Theory Fundamental Problems, Ideas and Theories ent://SD_ILS/0/SD_ILS:509290 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Manin, Yuri Ivanovic. author.<br/><a href="http://dx.doi.org/10.1007/3-540-27692-0">http://dx.doi.org/10.1007/3-540-27692-0</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:504178 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Tilborg, Henk C. A. editor.<br/><a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:504425 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Electronic Resources<br/> Brute Force Cracking the Data Encryption Standard ent://SD_ILS/0/SD_ILS:504600 2024-05-23T20:24:34Z 2024-05-23T20:24:34Z by&#160;Curtin, Matt. author.<br/><a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a><br/>Format:&#160;Electronic Resources<br/>