Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 13 from your keywords: subject="Public Key Cryptograp...
1 2 Next Last Page
cover
Lattice-based cryptosystems: a design perspective
Comment Share
Zhang, JiangZhang, Zhenfeng

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based e…

Edition
-
ISBN/ISSN
9789811584268
Collation
xiii, 174 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 ZHA l
Availability1
Add to basket
MARC DownloadCite
cover
The manga guide to cryptography
Comment Share
Masaaki MitaniShinichi SatoIdero Hinoki

Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphe…

Edition
-
ISBN/ISSN
9781593277420
Collation
xi, 233 hlm.; ill.: 24 cm.
Series Title
-
Call Number
652.8 MAS m
Availability1
Add to basket
MARC DownloadCite
cover
Advanced linear cryptanalysis of block and stream ciphers
Comment Share
Junod, PascalCanteaut, Anne

Contents: Experimenting linear cryptanalysis Linear cryptanalysis using multiple linear approximations Linera attacks on stream ciphers Using tools from error correcting theory in linear cryptanalysis Correlation analysis in GF (2) Subject index Author index

Edition
--
ISBN/ISSN
9781607508434
Collation
vii, 135 hal.; ilus.; 25 cm
Series Title
Cryptology and information security series volume 7
Call Number
005.82 JUN a
Availability2
Add to basket
MARC DownloadCite
cover
Access control, authentication, and public key infrastructure
Comment Share
Chapple, MikeBallad, BillBallad, TriciaBanks, Erin K.

Contents: PART ONE The need for access control systems Chapter 1 Access control framework Chapter 2 Assessing risk and its impact on access control Chapter 3 Business drivers for access controls Chapter 4 Access control policies, standards, procedures, and guidelines Chapter 5 Security Breaches and the law PART TWO Mitigating risk with access control systems, authentication, and…

Edition
Second Edition
ISBN/ISSN
9781284031591
Collation
xvii, 391 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CHA a
Availability1
Add to basket
MARC DownloadCite
cover
Cryptanalysis of RSA and its variants
Comment Share
Hinek, M. Jason

Contents: I. Preliminaries 1. The RSA Cryptosystem 2. Some Notation, Mathematics and Techniques II. Cryptanalysis of RSA 3. Some Early Attacks 4. Small Public Exponent Attacks 5. Small Private Exponent Attacks 6. Partial Key Exposure Attacks 7. More Small Private Exponent Attacks III. Cryptanalysis of Variants of RSA 8. Crt-Rsa 9. Multi-Prime RSA 10. Multi-Power RSA 1…

Edition
--
ISBN/ISSN
9781420075182
Collation
xviii, 268 hlm.: 25 cm.
Series Title
--
Call Number
005.82 HIN c
Availability3
Add to basket
MARC DownloadCite
cover
Internet security: cryptographic principles, algorithms, and protocols
Comment Share
Man, Young Rhee

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i
Availability9
Add to basket
MARC DownloadCite
cover
Algorithms and silicon architectures for public-key cryptography
Comment Share
Mclvor, Ciaran

Cotents: 1. Introduction 2. Background information 3. Modified montgomery modular multiplication and RSA exponentiation techniques 4. Montgomery multiplier architectures for public-key cryptosystems-camparisons and analysis 5. An improved montgomery modular inverse algorithm 6. An elliptic curve cryptographic accelerator over GF(p) 7. Public key cryptography for wireless sensor networ…

Edition
--
ISBN/ISSN
9783639007459
Collation
vii, 180 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.82 MCI a
Availability1
Add to basket
MARC DownloadCite
cover
Public key cryptography: applications and attacks
Comment Share
Batten, Lynn Margaret

Table of Contents Preface xii 0 Introduction 1 0.1 The Meaning of the Word Cryptography 2 0.2 Symmetric Key Cryptography 2 0.3 Public Key (Asymmetric) Cryptography 5 0.4 Key Establishment 8 0.5 Cryptography — more than just Hiding Secrets 9 0.6 Standards 10 0.7 Attacks 11 1 Congruence Equations 13 1.1 Congruence Arithmetic 13 1.1.1 Computer Examples 17 1.1.2 Problems 18 1.2 The…

Edition
--
ISBN/ISSN
9781118317129
Collation
xvii, 201 hlm.; 26 cm
Series Title
--
Call Number
005.82 BAT p
Availability3
Add to basket
MARC DownloadCite
cover
RSA and public-key cryptography
Comment Share
Mollin, Richard A.Rosen, Kenneth H

Contents: 1 History and Basic Cryptographic Concepts 2 Protocols, Discrete Log, and Diffie-Hellman 3 Public-Key Cryptography 4 Probabilistic Primality Tests 5 Factoring 6 Security of RSA 7 Authentication 8 Key Management 9 Applications and the Future Appendix A: Letter Frequency Analysis Appendix B: Elementary Complexity Theory Appendix C: Fundamental Facts Solutions to O…

Edition
-
ISBN/ISSN
1584883383
Collation
xii, 291 hlm.; 24 cm.
Series Title
-
Call Number
652.8 MOL r
Availability1
Add to basket
MARC DownloadCite
cover
Practical Signcryption
Comment Share
Dent, Alexander W.Zheng, Yuliang

Table of contents : Introduction Security for Signcryption: The Two-User Model Security for Signcryption: The Multi-User Model Signcryption Schemes Based on the Diffie–Hellman Problem Signcryption Schemes Based on Bilinear Maps Signcryption Schemes Based on the RSA Problem Hybrid Signcryption Concealment and Its Applications to Authenticated Encryption Parallel Signcryption Identit…

Edition
-
ISBN/ISSN
9783540894094
Collation
xviii, 274 hlm.; 26 cm.
Series Title
-
Call Number
005.82 DEN p
Availability1
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?