Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 64 from your keywords: subject="Data Encryption (Comp...
First Page Previous 1 2 3 4 5 Next Last Page
cover
Algebraic aspects of the advanced encryption standard
Comment Share
Cid, CarlosMurphy, SeanRobshaw, Matthew

Contents: INTRODUCTION TO THE AES MATHEMATICAL BACKGROUND DESCRIPTION OF THE AES ALGEBRAIC PROPERTIES OF THE AES EQUATION SYSTEMS FOR THE AES ANALYSIS OF AES EQUATION SYSTEMS CLOSING REMARKS

Edition
-
ISBN/ISSN
9780387243634
Collation
141 hlm.; 25 cm.
Series Title
-
Call Number
512.1 CID a
Availability1
Add to basket
MARC DownloadCite
cover
Analysis and design of cryptographic hash functions
Comment Share
Preneel, Bart

Abstract The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash function are reviewed. The information theoretic approach to authenticat…

Edition
-
ISBN/ISSN
--
Collation
xvii, 323 hlm.; 29 cm.
Series Title
-
Call Number
005.82 PRE a
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Jajodia, SushilTilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9781441959058
Collation
xl, 1416 hlm.; 26 cm
Series Title
-
Call Number
R005.803 TIL e
Availability2
Add to basket
MARC DownloadCite
cover
Black-box models of computation in cryptology
Comment Share
Jager, Tibor

Introduction -- Black-Box Models of Computation -- On Black-Box Ring Extraction and Integer Factorization -- Analysis of Cryptographic Assumptions in the Generic Ring Model -- The Generic Composite Residuosity Problem -- Semi-Generic Groups and Their Applications.

Edition
-
ISBN/ISSN
9783834819895
Collation
xii, 86 hlm.; 26 hlm.
Series Title
-
Call Number
005.82 JAG b
Availability2
Add to basket
MARC DownloadCite
cover
Cryptographic protocol: security analysis based on trusted freshness
Comment Share
Kefei, ChenLing, Dong

Contents: - Introduction of Cryptographic Protocol. - Informal Analysis. - Informal Analysis of Cryptographic Protocols. - Formal Approaches to Security Definition. - Formal Approaches to Security Establishment of Authentication Protocols. - Belief Multisets to Security Establishment of Authentication Protocols. - Automation Approaches to Security Establishment of Authentication Protoc…

Edition
-
ISBN/ISSN
9787040313314
Collation
xi, 373 hlm.; 24 cm.
Series Title
Information Security
Call Number
005.82 LIN c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with mathematical foundations and computer imple…
Comment Share
Rosen, Kenneth HStanoyevitch, Alexander

Content: An overview of the subject Divisibility and modular arithmetic The evolution of codemaking until the computer era Matrices and the Hill cryptosystem The evolution of codebreaking until the computer era Representation and arithmetic of integers in different bases Block cryptosystems and the data encryption standard (DES) Some number theory and algorithms Public key cry…

Edition
-
ISBN/ISSN
978-1439817636
Collation
xix, 649 hlm.; 26 cm.
Series Title
Discrete mathematics and its applications
Call Number
005.82 STA i
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Fifth Edition
ISBN/ISSN
9780136097044
Collation
xxiii, 743 hlm.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability2
Add to basket
MARC DownloadCite
cover
Practical Signcryption
Comment Share
Dent, Alexander W.Zheng, Yuliang

Table of contents : Introduction Security for Signcryption: The Two-User Model Security for Signcryption: The Multi-User Model Signcryption Schemes Based on the Diffie–Hellman Problem Signcryption Schemes Based on Bilinear Maps Signcryption Schemes Based on the RSA Problem Hybrid Signcryption Concealment and Its Applications to Authenticated Encryption Parallel Signcryption Identit…

Edition
-
ISBN/ISSN
9783540894094
Collation
xviii, 274 hlm.; 26 cm.
Series Title
-
Call Number
005.82 DEN p
Availability1
Add to basket
MARC DownloadCite
cover
Internet cryptography
Comment Share
Smith, Richard E.

CONTENTS: 1. Introduction - The Basic Problem. - Essentials of Crypto. - Crypto Is Hard to Use. - Balancing Crypto Use with Your Objectives. - Essentials of Networking and the Internet. - Protocol Layers and Network Products. - Internet Technology. - Internet Protocols in Your Host. - The Internet Security Problem. - An Internet Rogue's Gallery. - Setting Realistic Security Objecti…

Edition
-
ISBN/ISSN
201924803
Collation
xx, 356 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.8 SMI i
Availability4
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?