• Ebook Computer security and cryptography: Part 1

    Ebook Computer security and cryptography: Part 1

    Ebook Computer security and cryptography part 1 includes contents: Chapter 1 aperitifs, chapter 2 columnar transposition, chapter 3 monoalphabetic substitution, chapter 4 polyalphabetic substitution, chapter 5 statistical tests, chapter 6 the emergence of cipher machines, chapter 7 the Japanese cipher machines, chapter 8 stream ciphers.

     303 p actvn 26/09/2023 13 0

  • Ebook Coding theory and applications: Part 1

    Ebook Coding theory and applications: Part 1

    Part 1 of ebook "Coding theory and applications" provides readers with content including: capacity of higher-dimensional constrained systems; from 1D convolutional codes to 2D convolutional codes of rate 1/n; a coding-based approach to robust shortest-path routing; constructions of fast-decodable distributed space-time codes; cyclic generalized separable (L,G) codes; the one-out-of-k retrieval problem and linear network coding;...

     167 p actvn 27/08/2023 61 1

  • Ebook Coding theory and applications: Part 2

    Ebook Coding theory and applications: Part 2

    Continued part 1, part 2 of ebook "Coding theory and applications" provides readers with content including: on extendibility of additive code isometries; the extension theorem with respect to symmetrized weight compositions; minimal realizations of syndrome formers of a special class of 2D codes; shifted de bruijn graphs; new examples of non-abelian group codes; cyclic convolutional codes over separable extensions; reachability of random...

     180 p actvn 27/08/2023 52 0

  • Handbook of elliptic and hyperelliptic curve cryptography: Part 1

    Handbook of elliptic and hyperelliptic curve cryptography: Part 1

    Handbook of elliptic and hyperelliptic curve cryptography: Part 1 presents the following content: Chapter 1 introduction to public-key cryptography, chapter 2 algebraic background, chapter 3 background on p-adic numbers, chapter 4 background on curves and jacobians, chapter 5 varieties over special fields, chapter 6 background on pairings, chapter 7 background on weil descent, chapter 8 cohomological backgroundon point counting, chapter 9...

     423 p actvn 23/05/2023 62 0

  • Handbook of elliptic and hyperelliptic curve cryptography: Part 2

    Handbook of elliptic and hyperelliptic curve cryptography: Part 2

    Handbook of elliptic and hyperelliptic curve cryptography: Part 2 presents the following content: Chapter 16 implementation of pairings, chapter 17 point counting on elliptic and hyperelliptic curves, chapter 18 complex multiplication, chapter 19 generic algorithms for computing discrete logarithms, chapter 20 index calculus, chapter 21 index calculus for hyperelliptic curves, chapter 22 transfer of discrete logarithms, chapter 23 algebraic...

     420 p actvn 23/05/2023 65 0

  • Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathematicians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to...

     700 p actvn 27/02/2022 183 3

  • Ebook Understanding cryptography: A Textbook for Students and Practitioners

    Ebook Understanding cryptography: A Textbook for Students and Practitioners

    This book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in away that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computerscientists who are interested in a solid...

     382 p actvn 27/02/2022 169 1

  • Ebook Information security and cryptography texts and monographs

    Ebook Information security and cryptography texts and monographs

    "Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...

     372 p actvn 30/09/2021 263 0

  • Ebook Data-Driven Block ciphers for fast telecommunication systems

    Ebook Data-Driven Block ciphers for fast telecommunication systems

    Data-Driven Block ciphers for fast telecommunication systems. Among different directions of applied cryptography, the cipher design based on the data-driven operations (DDOs) is, by comparison, poorly represented in the published and available literature.

     210 p actvn 30/09/2021 283 0

  • Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

    Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

    A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals...

     458 p actvn 26/09/2018 524 4

  • Ebook Modern Cryptography - Theory and Practice: Phần 1

    Ebook Modern Cryptography - Theory and Practice: Phần 1

    Part 1 books Pc Underground give readers the knowledge overview: beginning with a simple communication game, wrestling between safeguard and attack, probability and information theory, computational complexity, algebraic foundations,... Invite you to consult.

     387 p actvn 28/02/2018 529 1

  • Ebook Modern Cryptography - Theory and Practice: Phần 2

    Ebook Modern Cryptography - Theory and Practice: Phần 2

    Part 1 of the book serial ebook Pc Underground to part 2 of you will continue to learn about relevant issues such as: authentication protocols — principles, authentication protocols — the real world, authentication framework for public-key cryptography, formal and strong security definitions for public-key cryptosystems,... Document serve you specialized information technology and related industries.

     368 p actvn 28/02/2018 523 1

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn