Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 37 from your keywords: subject="Coding Theory"
First Page Previous 1 2 3 4 Next Last Page
cover
Belajar coding itu penting di era revolusi industri 4.0
Comment Share
Yeni Mulyani

Revolusi industri sudah merambah seluruh aspek kehidupan. Untuk menghadapi tantangan ini, tentu kita sebagai generasi milenial tidak bisa hanya duduk dan belajar melalui teks dan buku. Itu, sudah menjadi bahan pokok, yang kemudian harus diimbangi dengan pemahaman teknologi masa kini. DAFTAR ISI BAB 1 Peran Tekhnologi di Era Revolusi Industri 4.0 BAB 2 Tekhnologi dalam konsep pendidikan unt…

Edition
-
ISBN/ISSN
9786023763672
Collation
160 hlm.; 23 cm
Series Title
-
Call Number
005.1 YEN b
Availability3
Add to basket
MARC DownloadCite
cover
Quantum computational number theory
Comment Share
Yan, Song Y.

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…

Edition
-
ISBN/ISSN
9783319798462
Collation
ix, 252 hlm.: ilus.; 23 cm
Series Title
-
Call Number
512.7 YAN q
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Error control coding
Comment Share
Costello, Daniel J.Lin, Shu

Termasuk bibliografi dan indeks. CONTENTS: 1. Coding for Reliable Digital Transmission and Storage. 2. Introduction to Algebra. 3. Linear Block Codes. 4. Important Linear Block Codes. 5. Cyclic Codes. 6. Binary BCH Codes. 7. Nonbinary BCH Codes, Reed-Solomon Codes, and Decoding Algorithms. 8. Majority-Logic Decodable Codes. 9. Trellises for Linear Block Codes. 10. Reliability-Base…

Edition
Second Edition
ISBN/ISSN
130426725
Collation
xii, 1260 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.7 LIN e
Availability1
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9781441926746
Collation
xv, 523 hlm.; 24 cm
Series Title
--
Call Number
652.8 HOF u2
Availability1
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9780387779935
Collation
xv, 523 hlm.; 24 cm.
Series Title
--
Call Number
652.8 HOF i
Availability5
Add to basket
MARC DownloadCite
cover
Foundations of coding: compression, encryption, error correction
Comment Share
Dumas, Jean- GuillaumeRoch, Jean- LouisTannier, EricVarrette, Sebastien

Contents Introduction 1 Foundations of coding 1.1 From Julius Caesar to telecopy 1.2 Stream ciphers and probabilities 1.3 Block ciphers, algebra, and arithmetic 1.4 Decoding, decryption, attacks 2 Information theory and compression 2.1 Information theory 2.2 Statistical encoding 2.3 Heuristics of entropy reduction 2.4 Common compression codes 2.5 Lossy compression 3 Cryptolog…

Edition
--
ISBN/ISSN
9781118881446
Collation
xviii, 355 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 DUM s
Availability1
Add to basket
MARC DownloadCite
cover
Mathematical foundations of public key cryptography
Comment Share
Xiaoyun WangGuangwu XuMingqiang WangXianmeng Meng

Contents Chapter 1. Divisibility of integers Chapter 2. Congruences Chapter 3. Congruences equations Chapter 4. Exponents and primitive roots Chapter 5. Some elementary results for prime distribution Chapter 6. Simple continued fractions Chapter 7. Basic concepts Chapter 8. Group theory Chapter 9. Rings and fields Chapter 10 Some mathematical problems in public key cryptography Cha…

Edition
--
ISBN/ISSN
9781498702232
Collation
xv, 220 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XIA m
Availability1
Add to basket
MARC DownloadCite
cover
Practical cryptography: algorithms and implementations using C++
Comment Share
Azad, SaifulPathan, Al-Sakib Khan

Contents: ch. 1 Basics of Security and Cryptography /​ Al-Sakib Khan Pathan ch. 2 Classical Cryptographic Algorithms /​ Saiful Azad ch. 3 Rotor Machine /​ Saiful Azad ch. 4 Block Cipher /​ Saiful Azad ch. 5 Data Encryption Standard /​ Saiful Azad ch. 6 Advanced Encryption Standard /​ Saiful Azad ch. 7 Asymmetric Key Algorithms /​ Saiful Azad ch. 8 The RSA Algorithm /​ Sa…

Edition
--
ISBN/ISSN
9781482228892
Collation
xix, 345 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 AZA p
Availability1
Add to basket
MARC DownloadCite
cover
New stream cipher designs: the eSTREAM finalists
Comment Share
Robshaw, MatthewBillet, Olivier

Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…

Edition
--
ISBN/ISSN
9783540683506
Collation
viii, 293 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 ROB n
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?