Search Results for SpringerLink (Online service) - Narrowed by: Coding and Information Theory. - Theory of Computation.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Konu$002509Coding$002band$002bInformation$002bTheory.$002509Coding$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Konu$002509Theory$002bof$002bComputation.$002509Theory$002bof$002bComputation.$0026ps$003d300?2024-08-02T17:37:07ZQuantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:205592024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>An Introduction to Kolmogorov Complexity and Its Applicationsent://SD_ILS/0/SD_ILS:4278512024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Li, Ming. author.<br/><a href="https://doi.org/10.1007/978-3-030-11298-1">https://doi.org/10.1007/978-3-030-11298-1</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Theory of Quantum Computation, Communication, and Cryptography 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papersent://SD_ILS/0/SD_ILS:240022024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Bacon, Dave. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54429-3">http://dx.doi.org/10.1007/978-3-642-54429-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2222512024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222502024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2264782024-08-02T17:37:07Z2024-08-02T17:37:07ZYazar Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format: Electronic Resources<br/>