Search Results for - Narrowed by: Springer E-Book Collection - Data Encryption. - Computation by Abstract Devices. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bEncryption.$002509Data$002bEncryption.$0026qf$003dSUBJECT$002509Konu$002509Computation$002bby$002bAbstract$002bDevices.$002509Computation$002bby$002bAbstract$002bDevices.$0026ps$003d300? 2024-05-18T11:27:04Z Progress in Cryptology &ndash; AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:17644 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:18617 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18618 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:24743 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:24744 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:20875 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:23975 2024-05-18T11:27:04Z 2024-05-18T11:27:04Z Yazar&#160;Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>