Search Results for - Narrowed by: Management of Computing and Information Systems. - Discrete Mathematics in Computer Science. - Cryptology. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Discrete$002bMathematics$002bin$002bComputer$002bScience.$002509Discrete$002bMathematics$002bin$002bComputer$002bScience.$0026qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026ps$003d300? 2024-05-28T06:14:19Z Topics in Cryptology &ndash; CT-RSA 2017 The Cryptographers&rsquo; Track at the RSA Conference 2017, San Francisco, CA, USA, February 14&ndash;17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224973 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Handschuh, Helena. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52153-4">https://doi.org/10.1007/978-3-319-52153-4</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222093 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Guilley, Sylvain. editor. (orcid)0000-0002-5044-3534<br/><a href="https://doi.org/10.1007/978-3-319-64647-3">https://doi.org/10.1007/978-3-319-64647-3</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223132 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:223803 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56614-6">https://doi.org/10.1007/978-3-319-56614-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:224897 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56617-7">https://doi.org/10.1007/978-3-319-56617-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2017 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 &ndash; May 4, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:224259 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Coron, Jean-S&eacute;bastien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56620-7">https://doi.org/10.1007/978-3-319-56620-7</a><br/>Format:&#160;Electronic Resources<br/> Paradigms in Cryptology &ndash; Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:226158 2024-05-28T06:14:19Z 2024-05-28T06:14:19Z Yazar&#160;Phan, Rapha&euml;l C.-W. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61273-7">https://doi.org/10.1007/978-3-319-61273-7</a><br/>Format:&#160;Electronic Resources<br/>