Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 52 from your keywords: subject="Mathematics"
1 2 3 4 5 Next Last Page
cover
Cryptological Mathematics
Comment Share
Robert Edward Lewand

Edition
Cet. I
ISBN/ISSN
9780883857199
Collation
199 hal : illus. ; 26 cm.
Series Title
Classroom resource materials (Unnumbered)
Call Number
652.8 LEW C

Edition
Cet. I
ISBN/ISSN
9780883857199
Collation
199 hal : illus. ; 26 cm.
Series Title
Classroom resource materials (Unnumbered)
Call Number
652.8 LEW C
Availability2
Add to basket
MARC DownloadCite
cover
Encrypt, sign, attack: a compact introduction to cryptography
Comment Share
Manz, Olaf

This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In ea…

Edition
Vol. 4
ISBN/ISSN
9783662660157
Collation
x, 134 hal : 23cm
Series Title
Mathematics Study Resources Series
Call Number
005.82 MAN e
Availability2
Add to basket
MARC DownloadCite
cover
Lai-massey cipher designs : history, design criteria and cryptanalysis
Comment Share
Nakahara, Jorge Jr.

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …

Edition
-
ISBN/ISSN
9783319682723
Collation
xvii, 726 hlm; 23,5 cm
Series Title
-
Call Number
005.82 NAK l
Availability2
Add to basket
MARC DownloadCite
cover
Multivariate public key cryptosystems (advances in information security book 80)
Comment Share
Ding, JintaiPetzoldt, AlbrechtSchmidt, Dieter S.

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. Table of Contents 1. Introduction 2. Multivariate Cryptography 3. The Matsumoto-Imai Cryptosystem 4. Hidden Field Equations 5. Oil and Vinegar 6. MQDSS 7. The SimpleMatrix Encryption Scheme 8. …

Edition
2nd ed
ISBN/ISSN
9781071609859
Collation
xxv, 253 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 DIN m
Availability1
Add to basket
MARC DownloadCite
cover
The discrete math workbook: a companion manual using Python
Comment Share
Kurgalin, SergeiBorzunov, Sergei

This practically-focused study guide introduces the fundamentals of discrete mathematics through an extensive set of classroom-tested problems. Each chapter presents a concise introduction to the relevant theory, followed by a detailed account of common challenges and methods for overcoming these. The reader is then encouraged to practice solving such problems for themselves, by tackling a vari…

Edition
-
ISBN/ISSN
9783030422202
Collation
xvii, 500 hlm; 23,5 cm
Series Title
-
Call Number
004.0151 KUR t
Availability1
Add to basket
MARC DownloadCite
cover
Lattice-based cryptosystems: a design perspective
Comment Share
Zhang, JiangZhang, Zhenfeng

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based e…

Edition
-
ISBN/ISSN
9789811584268
Collation
xiii, 174 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 ZHA l
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography arithmetic: algorithms and hardware architectures (advances in i…
Comment Share
Omondi, Amos R.

This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…

Edition
-
ISBN/ISSN
9783030341411
Collation
xiv, 336 hlm.: ilus.; 24 cm
Series Title
Advances in Information Security Book 77
Call Number
005.82 OMO c
Availability1
Add to basket
MARC DownloadCite
cover
Discrete mathematics and graph theory: a concise study companion and guide (u…
Comment Share
Erciyes, K.

This textbook can serve as a comprehensive manual of discrete mathematics and graph theory for non-Computer Science majors; as a reference and study aid for professionals and researchers who have not taken any discrete math course before. It can also be used as a reference book for a course on Discrete Mathematics in Computer Science or Mathematics curricula. Table of Contents Part I Fund…

Edition
-
ISBN/ISSN
9783030611149
Collation
xvi, 336 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
004.0151 ERC d
Availability1
Add to basket
MARC DownloadCite
cover
Cryptology for engineers: an application-oriented mathematical introduction
Comment Share
Schmied, Robert

Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a s…

Edition
-
ISBN/ISSN
9789811208041
Collation
xx, 384 hlm; 23 cm
Series Title
-
Call Number
005.82 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
Feistel ciphers : security proofs and cryptanalysis
Comment Share
Nachef, ValeriePatarin, JacquesVolte, Emmanuel

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2,…

Edition
-
ISBN/ISSN
9783319495286
Collation
xv, 309 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.82 NAC f
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?