null
Catatan: terdapat indeks.
Catatan: Terdapat Index Table of Contents: Acknowledgments. Introduction. Chapter 1: Simple Ciphers. Chapter 2: Number Theoretical Ciphers. Chapter 3: Factoring and Discrete Algorithms. Chapter 4: Block Ciphers. Chapter 5: General Cryptanalytic Methods. Chapter 6: Linear Cryptanalysis. Chapter 7: Differential Cryptanalysis.
Anak Judul theory, concepts, and practice. CONTENTS: Preface About the Authors Chapter 1 The Engineering Design Process Chapter 2 Project Selection and Needs Identification Chapter 3 The Requirements Specification Chapter 4 Concept Generation and Evaluation Chapter 5 System Design I: Functional Decomposition Chapter 6 System Design II: Behavior Models Chapter 7 Testing Chapter 8 System Reliabi…
Termasuk bibliografi dan indeks. CONTENTS: 1 Introduction and Overview < >1.1 Cryptography basics < >1.2 Public-key cryptography < >< >1.2.1 RSAsystems < >< >1.2.2 Discrete logarithmsystems < >< >1.2.3 Elliptic curve systems < >1.3 Why elliptic curve cryptography? < >1.4 Roadmap < >1.5 Notes and fur…
Terdapat indeks. CONTENTS: 1. Basic concepts 2. Frequency selective circuits and matching 3. Active devices and amplifiers 4. Mixers, modulators and demodulators 5. Oscillators and phase locked loops 6. Transmission lines and scattering matrices 7. Power amplifiers 8. Filters 9. Electromagnetic waves 10. Antennas 11. Propagation 12. Digital techniques in radio Index.
Table of Contents: [Article 9] Silence is Golden: Exploiting Jamming and Radio Silence to Communicate (Roberto Di Pietro, Gabriele Oligeri) [Article 10] Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport (Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar) [Article 11] Pareto-Optimal Adversarial Defense of Enterprise Systems (Ed…
Contents: [Article 7] Residual Investigation: Predictive and Precise Bug Detection [Article 8] A Large-Scale Evaluation of Automated unit Test Generation Using EvoSuite [Article 9] Conditional Commitments: Reasoning and Model Checkingrn[Article 10] A Unified Test Case Prioritization Approach [Article 11] Formal verification of Software Countermeasures Against Side-Channel Attacks [Article …