Search Results for - Narrowed by: 2019 - Coding theory. - Computers. - Data encryption (Computer science). SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092019$0025092019$0026qf$003dSUBJECT$002509Konu$002509Coding$002btheory.$002509Coding$002btheory.$0026qf$003dSUBJECT$002509Konu$002509Computers.$002509Computers.$0026qf$003dSUBJECT$002509Konu$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026ps$003d300$0026isd$003dtrue? 2024-07-05T03:12:24Z Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428422 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26948-7">https://doi.org/10.1007/978-3-030-26948-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428537 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34618-8">https://doi.org/10.1007/978-3-030-34618-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428490 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26954-8">https://doi.org/10.1007/978-3-030-26954-8</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429040 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427778 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2019 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18&ndash;22, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:427913 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Boldyreva, Alexandra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26951-7">https://doi.org/10.1007/978-3-030-26951-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428024 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34578-5">https://doi.org/10.1007/978-3-030-34578-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428778 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/> Cryptography with Shrinking Generators Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation ent://SD_ILS/0/SD_ILS:428793 2024-07-05T03:12:24Z 2024-07-05T03:12:24Z Yazar&#160;D&iacute;az Cardell, Sara. author.<br/><a href="https://doi.org/10.1007/978-3-030-12850-0">https://doi.org/10.1007/978-3-030-12850-0</a><br/>Format:&#160;Electronic Resources<br/>