Revolusi industri sudah merambah seluruh aspek kehidupan. Untuk menghadapi tantangan ini, tentu kita sebagai generasi milenial tidak bisa hanya duduk dan belajar melalui teks dan buku. Itu, sudah menjadi bahan pokok, yang kemudian harus diimbangi dengan pemahaman teknologi masa kini. DAFTAR ISI BAB 1 Peran Tekhnologi di Era Revolusi Industri 4.0 BAB 2 Tekhnologi dalam konsep pendidikan unt…
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Pa…
Termasuk bibliografi dan indeks. CONTENTS: 1. Coding for Reliable Digital Transmission and Storage. 2. Introduction to Algebra. 3. Linear Block Codes. 4. Important Linear Block Codes. 5. Cyclic Codes. 6. Binary BCH Codes. 7. Nonbinary BCH Codes, Reed-Solomon Codes, and Decoding Algorithms. 8. Majority-Logic Decodable Codes. 9. Trellises for Linear Block Codes. 10. Reliability-Base…
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Contents Introduction 1 Foundations of coding 1.1 From Julius Caesar to telecopy 1.2 Stream ciphers and probabilities 1.3 Block ciphers, algebra, and arithmetic 1.4 Decoding, decryption, attacks 2 Information theory and compression 2.1 Information theory 2.2 Statistical encoding 2.3 Heuristics of entropy reduction 2.4 Common compression codes 2.5 Lossy compression 3 Cryptolog…
Contents Chapter 1. Divisibility of integers Chapter 2. Congruences Chapter 3. Congruences equations Chapter 4. Exponents and primitive roots Chapter 5. Some elementary results for prime distribution Chapter 6. Simple continued fractions Chapter 7. Basic concepts Chapter 8. Group theory Chapter 9. Rings and fields Chapter 10 Some mathematical problems in public key cryptography Cha…
Contents: ch. 1 Basics of Security and Cryptography / Al-Sakib Khan Pathan ch. 2 Classical Cryptographic Algorithms / Saiful Azad ch. 3 Rotor Machine / Saiful Azad ch. 4 Block Cipher / Saiful Azad ch. 5 Data Encryption Standard / Saiful Azad ch. 6 Advanced Encryption Standard / Saiful Azad ch. 7 Asymmetric Key Algorithms / Saiful Azad ch. 8 The RSA Algorithm / Sa…
Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…