Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Information security
Bookmark Share

Text

Information security

Stamp, Mark - Personal Name;

Anak judul: principles and practice.
Termasuk bibliografi dan indeks.

ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Field Arithmetic2.1 Introduction to finite fields 2.2 Primefieldarithmetic 2.2.1 Addition and subtraction 2.2.2 Integer multiplication 2.2.3 Integer squaring 2.2.4 Reduction 2.2.5 Inversion 2.2.6 NISTprimes 2.3 Binary field arithmetic 2.3.1 Addition 2.3.2 Multiplication 2.3.3 Polynomial multiplication 2.3.4 Polynomial squaring 2.3.5 Reduction 2.3.6 Inversion and division 2.4 Optimal extension field arithmetic 2.4.1 Addition and subtraction 2.4.2 Multiplication and reduction 2.4.3 Inversion 2.5 Notes andfurther references 3 Elliptic Curve Arithmetic 3.1 Introduction to elliptic curves 3.1.1 Simplified Weierstrass equations 3.1.2 Group law3.1.3 Group order 3.1.4 Group structure 3.1.5 Isomorphism classes 3.2 Point representation and the group law 3.2.1 Projective coordinates 3.2.2 The elliptic curve y2 = x3 +ax +b 3.2.3 The elliptic curve y2 +xy = x3 +ax2 +b 3.3 Point multiplication 3.3.1 Unknown point 3.3.2 Fixed point 3.3.3 Multiple point multiplication 3.4 Koblitz curves 3.4.1 The Frobenius map and the ring Z[


Availability
#
Location name is not set (Rak 000) 005.8 STA i
00000649dup
Available but not for loan - Missing
#
Location name is not set Location name is not set
00000650dup
Available but not for loan - Missing
#
Location name is not set Location name is not set
00000651dup
Available but not for loan - Missing
#
Location name is not set Location name is not set
00000652dup
Available but not for loan - Missing
#
Location name is not set Location name is not set
00000653dup
Available but not for loan - Missing
Detail Information
Series Title
null
Call Number
005.8 STA i
Publisher
New Jersey : John Wiley & Sons., 2006
Collation
xxi, 390 hlm.; ilus.; 25 cm.
Language
English
ISBN/ISSN
9780471738480
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
null
Subject(s)
Computer security
Specific Detail Info
-
Statement of Responsibility
Mark Stamp
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?