Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 153 from your keywords: subject="Cryptography"
First Page Previous 6 7 8 9 10 Next Last Page
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9781441926746
Collation
xv, 523 hlm.; 24 cm
Series Title
--
Call Number
652.8 HOF u2
Availability1
Add to basket
MARC DownloadCite
cover
Applied cryptography: protocols, algorithms, and source code in C
Comment Share
Schneier, Bruce

Contents: Chapter 1—Foundations Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Chapter 3—Basic Protocols Chapter 4—Intermediate Protocols Chapter 5—Advanced Protocols Chapter 6—Esoteric Protocols Part II—Cryptographic Techniques Chapter 7—Key Length Chapter 8—Key Management Chapter 9—Algorithm Types and Modes Chapter 10—Using Algorith…

Edition
Second Edition
ISBN/ISSN
9780471117094
Collation
xxiii, 758 hlm.; 24 cm.
Series Title
--
Call Number
005.82 SCH a
Availability12
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9780387779935
Collation
xv, 523 hlm.; 24 cm.
Series Title
--
Call Number
652.8 HOF i
Availability5
Add to basket
MARC DownloadCite
cover
New directions of modern cryptography
Comment Share
Cao, Zhenfu

Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…

Edition
--
ISBN/ISSN
9781466501386
Collation
xv, 384 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CAO n
Availability1
Add to basket
MARC DownloadCite
cover
Advanced linear cryptanalysis of block and stream ciphers
Comment Share
Junod, PascalCanteaut, Anne

Contents: Experimenting linear cryptanalysis Linear cryptanalysis using multiple linear approximations Linera attacks on stream ciphers Using tools from error correcting theory in linear cryptanalysis Correlation analysis in GF (2) Subject index Author index

Edition
--
ISBN/ISSN
9781607508434
Collation
vii, 135 hal.; ilus.; 25 cm
Series Title
Cryptology and information security series volume 7
Call Number
005.82 JUN a
Availability2
Add to basket
MARC DownloadCite
cover
Access control, authentication, and public key infrastructure
Comment Share
Chapple, MikeBallad, BillBallad, TriciaBanks, Erin K.

Contents: PART ONE The need for access control systems Chapter 1 Access control framework Chapter 2 Assessing risk and its impact on access control Chapter 3 Business drivers for access controls Chapter 4 Access control policies, standards, procedures, and guidelines Chapter 5 Security Breaches and the law PART TWO Mitigating risk with access control systems, authentication, and…

Edition
Second Edition
ISBN/ISSN
9781284031591
Collation
xvii, 391 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CHA a
Availability1
Add to basket
MARC DownloadCite
cover
Digital signatures
Comment Share
Katz, Jonathan

Contents: Part I Setting the stage 1 Digital signatures: beckground and definitions 2 Cryprographic harness assumptions Part II Digital signature schemes without random oracles 3 Constructions based on general assumptions 4 Signature schemes based on the (strong) RSA assumption 5 Constructions based on bilinear maps Part III Digital signature shemes in the random oracle model 6 T…

Edition
--
ISBN/ISSN
9780387277110
Collation
xiii, 192 hal.; 24 cm
Series Title
--
Call Number
005.8 KAT d
Availability2
Add to basket
MARC DownloadCite
cover
Applied cryptanalysis: breaking ciphers in the real world
Comment Share
Stamp, MarkLow, Richard M.

Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra

Edition
--
ISBN/ISSN
9780470114865
Collation
xix, 401 hlm.; 24 cm.
Series Title
--
Call Number
005.82 STA a
Availability14
Add to basket
MARC DownloadCite
cover
A classical introduction to cryptography exercise book
Comment Share
Baigneres, ThomasJunod, PascalMonnerat, JeanVaudenay, SergeYi, Lu

contents: - Prehistory of Cryptography - Conventional Cryptography - Dedicated Conventional Cryptographic Primitives - Conventional Security Analysis - Security Protocols with Conventional Cryptography - Algorithmic Algebra - Algorithmic Number Theory - Elements of Complexity Theory - Public Key Cryptography - Digital Signatures - Cryptographic Protocols - From Cryptography to Com…

Edition
--
ISBN/ISSN
9780387279343
Collation
xiv, 254 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 BAI c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptanalysis of RSA and its variants
Comment Share
Hinek, M. Jason

Contents: I. Preliminaries 1. The RSA Cryptosystem 2. Some Notation, Mathematics and Techniques II. Cryptanalysis of RSA 3. Some Early Attacks 4. Small Public Exponent Attacks 5. Small Private Exponent Attacks 6. Partial Key Exposure Attacks 7. More Small Private Exponent Attacks III. Cryptanalysis of Variants of RSA 8. Crt-Rsa 9. Multi-Prime RSA 10. Multi-Power RSA 1…

Edition
--
ISBN/ISSN
9781420075182
Collation
xviii, 268 hlm.: 25 cm.
Series Title
--
Call Number
005.82 HIN c
Availability3
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?