Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 160 from your keywords: subject="Cryptography"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
cover
Complexity and cryptography : an introduction
Comment Share
Talbot, John

Contents: 1. Basics of cryptography; 2. Complexity theory; 3. Non-deterministic computation; 4. Probabilistic computation; 5. Symmetric cryptosystems; 6. One-way functions; 7. Public key cryptography; 8. Digital signatures; 9. Key establishment protocols; 10. Secure encryption; 11. Identification schemes; Appendix 1; Appendix 2; Appendix 3; Appendix 4; Appendix …

Edition
-
ISBN/ISSN
5216177715
Collation
xii, 292 hlm.; 23 cm.
Series Title
-
Call Number
005.82 TAL c
Availability1
Add to basket
MARC DownloadCite
cover
Practical Signcryption
Comment Share
Dent, Alexander W.Zheng, Yuliang

Table of contents : Introduction Security for Signcryption: The Two-User Model Security for Signcryption: The Multi-User Model Signcryption Schemes Based on the Diffie–Hellman Problem Signcryption Schemes Based on Bilinear Maps Signcryption Schemes Based on the RSA Problem Hybrid Signcryption Concealment and Its Applications to Authenticated Encryption Parallel Signcryption Identit…

Edition
-
ISBN/ISSN
9783540894094
Collation
xviii, 274 hlm.; 26 cm.
Series Title
-
Call Number
005.82 DEN p
Availability1
Add to basket
MARC DownloadCite
cover
Digital signature schemes: general framework and fail-stop signatures
Comment Share
Pfitzmann, Birgit

Requirements on digital signature schemes History of digital signature schemes Information-theoretic security for signers: Introduction Terminology Properties of digital signature schemes Overview of existing schemes with other than ordinary security Conventional definitions of fail-stop signature schemes and general reductions Building blocks Constructions for one message block Signin…

Edition
-
ISBN/ISSN
3540615172
Collation
xvi, 396 hlm.; 25 cm.
Series Title
-
Call Number
005.8 PFI d
Availability0
Add to basket
MARC DownloadCite
cover
Hiding in plain sight: steganography and the art of covert communication
Comment Share
Cole, Eric

Contents: Introduction. Part One: Exploring the World of Covert Communication. Chapter 1: Covert Communication: It’s All Around You. Chapter 2:” Cryptography Explained. Chapter 3 :Hiding the Goods with Steganography. Chapter 4: Digital Watermarking. Part Two: The Hidden Realm of Steganography. Chapter 5: Steganography at Large. Chapter 6: Nuts and Bolts of…

Edition
-
ISBN/ISSN
471444499
Collation
xviii, 335 hlm.; 24 cm.
Series Title
-
Call Number
005.8 COL h
Availability1
Add to basket
MARC DownloadCite
cover
The codebreakers: the story of secret writing
Comment Share
Kahn, David

Edition
-
ISBN/ISSN
722151462
Collation
xvi, 476 hlm.; 18 cm.
Series Title
-
Call Number
652.8 KAH c

Edition
-
ISBN/ISSN
722151462
Collation
xvi, 476 hlm.; 18 cm.
Series Title
-
Call Number
652.8 KAH c
Availability0
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with Java applets
Comment Share
Bishop, David

Contents: Chapter 1: A History of Cryptography 1 Chapter 2: Large Integer Computing 33 Chapter 3: The Integers 65 Chapter 4: Linear Diophantine Equations and Linear Congruences 89 Chapter 5: Linear Ciphers 105 Chapter 6: Systems of Linear Congruences—Single Modulus 125 Chapter 7: Matrix Ciphers 143 Chapter 8: Systems of Linear Congruences—Multiple Moduli 161 Chapter 9: Quadrati…

Edition
-
ISBN/ISSN
763722073
Collation
xvi, 370 hlm.; 24 cm.
Series Title
-
Call Number
005.8 BIS i
Availability1
Add to basket
MARC DownloadCite
cover
Beginning cryptography with Java
Comment Share
Hook, David

Contents: Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chap…

Edition
-
ISBN/ISSN
9788126506262
Collation
xxiv, 448 hlm.; 24 cm.
Series Title
-
Call Number
005.8 HOO b
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography in C and C++
Comment Share
Welschenbach, Michael

Contents: 1 Introduction 2 Number Formats: The Representation of Large Numbers in C 3 Interface Semantics 4 The Fundamental Operations 5 Modular Arithmetic: Calculating with Residue Classes 6 Where All RoadsMeet:Modular Exponentiation 7 Bitwise and Logical Functions 8 Input, Output, Assignment, Conversion 9 Dynamic Registers 10 Basic Number-Theoretic Functions 11 Rijndael: …

Edition
Second Edition
ISBN/ISSN
1590595025
Collation
xxv, 478 hlm.; 26 cm.
Series Title
-
Call Number
005.8 WEL c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography: protocols, design, and applications
Comment Share
Lek, KamolRajapakse, Naruemol

Preface Quantum Cryptographic Protocols and Quantum Security (Laszlo Gyongyosi, Sandor Imre, Department of Telecommunications, Budapest University of Technology and Economics, Budapest, Hungary) Low-Cost Mutual Authentication Protocols (Mu’awya Naser, Pedro Peris-Lopez, Mohammad Rafie, Rahmat Budiarto, School of Computer Sciences, Unvirisity Sinas Malaysia, Pinang, Malaysia, and other…

Edition
-
ISBN/ISSN
9781621007791
Collation
ix, 242 hlm.; 26 cm.
Series Title
Crytography, Steganography and Data Security
Call Number
005.82 LEK c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?