Información de una colección
|
Documentos disponibles dentro de esta colección (3)
Algorithmic cryptanalysis / Antoine Joux / Boca Raton : CRC Press (2009)
Título : Algorithmic cryptanalysis Tipo de documento: texto impreso Autores: Antoine Joux, Autor Mención de edición: Primera edición Editorial: Boca Raton : CRC Press Fecha de publicación: 2009 Colección: Chapman & Hall/CRC cryptography and network security Número de páginas: 501 páginas Il.: tablas Dimensiones: 24 cm ISBN/ISSN/DL: 978-1-4200-7002-6 Nota general: Incluye referencias bibliográficas Idioma : Inglés (eng) Clasificación: 438 Uso del alemán estándar (lingüística prescriptiva) lingüística aplicada Nota de contenido: A bird's-eye view of modern cryptography -- Elementary number theory and algebra background -- Linear algebra -- Sieve algorithms -- Brute force cryptanalysis -- The birthday paradox : sorting or not? -- Birthday-based algorithms for functions -- Birthday attacks through quadrisection -- Fourier and Hadamard-Walsh transforms -- Lattice reduction -- Polynomial systems and Grobner base computations -- Attacks on stream ciphers -- Lattice-based cryptanalysis -- Elliptic curves and pairings -- Index calculus algorithms. Link: https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=105994 Algorithmic cryptanalysis [texto impreso] / Antoine Joux, Autor . - Primera edición . - Boca Raton : CRC Press, 2009 . - 501 páginas : tablas ; 24 cm. - (Chapman & Hall/CRC cryptography and network security) .
ISBN : 978-1-4200-7002-6
Incluye referencias bibliográficas
Idioma : Inglés (eng)
Clasificación: 438 Uso del alemán estándar (lingüística prescriptiva) lingüística aplicada Nota de contenido: A bird's-eye view of modern cryptography -- Elementary number theory and algebra background -- Linear algebra -- Sieve algorithms -- Brute force cryptanalysis -- The birthday paradox : sorting or not? -- Birthday-based algorithms for functions -- Birthday attacks through quadrisection -- Fourier and Hadamard-Walsh transforms -- Lattice reduction -- Polynomial systems and Grobner base computations -- Attacks on stream ciphers -- Lattice-based cryptanalysis -- Elliptic curves and pairings -- Index calculus algorithms. Link: https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=105994
Algorithmic cryptanalysis
Joux, Antoine - Boca Raton : CRC Press - 2009
Incluye referencias bibliográficas
A bird's-eye view of modern cryptography -- Elementary number theory and algebra background -- Linear algebra -- Sieve algorithms -- Brute force cryptanalysis -- The birthday paradox : sorting or not? -- Birthday-based algorithms for functions -- Birthday attacks through quadrisection -- Fourier and Hadamard-Walsh transforms -- Lattice reduction -- Polynomial systems and Grobner base computations -- Attacks on stream ciphers -- Lattice-based cryptanalysis -- Elliptic curves and pairings -- Index calculus algorithms.
Reserva
Reservar este documento
Ejemplares (1)
Código de barras Signatura Tipo de medio Ubicación Sección Estado 23-1358-01 005.82 J76 Libros Bib. Esp. Ing Sistemas Estanteria (Libros) Disponible Algorithms and theory of computation handbook / Boca Raton : CRC Press (2009)
Título : Algorithms and theory of computation handbook : special topics and techniques Tipo de documento: texto impreso Autores: Mikhail J. Atallah, Editor científico ; Mikhail J. Atallah, Editor científico ; Mikhail J. Atallah, Editor científico ; Marina Blanton, Editor científico ; Marina Blanton, Editor científico ; Marina Blanton, Editor científico Mención de edición: Segunda edicicón Editorial: Boca Raton : CRC Press Fecha de publicación: 2009 Colección: Chapman & Hall/CRC cryptography and network security Número de páginas: xiii, Il.: paginas irregulares Dimensiones: 25 cm ISBN/ISSN/DL: 978-1-58488-820-8 Idioma : Inglés (eng) Clasificación: 637.302 Nota de contenido: Computational geometry I -- Computational geometry II -- Computational topology -- Robot algorithms -- Vision and image processing algorithms -- Graph drawing algorithms -- Algorithmics in intensity-modulated radiation therapy -- VLSI layout algorithms -- Cryptographic foundations -- Encryption schemes -- Cryptanalysis -- Crypto topics and applications I -- Crypto topics and applications II -- Secure multiparty computation -- Voting schemes -- Auction protocols -- Pseudorandom sequences and stream ciphers -- Theory of privacy and anonymity -- Database theory: query languages -- Scheduling algorithms -- Computational game theory: an introduction -- Artificial intelligence search algorithms -- Algorithmic aspects of natural language processing -- Algorithmic techniques for regular networks of processors -- Parallel algorithms -- Self-stabilizing algorithms -- Theory of communication networks -- Network algorithmics -- Algorithmic issues in grid computing -- Uncheatable grid computing -- DNA computing: a research snapshot -- Computational systems biology -- Pricing algorithms for financial derivatives. Link: https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=106001 Algorithms and theory of computation handbook : special topics and techniques [texto impreso] / Mikhail J. Atallah, Editor científico ; Mikhail J. Atallah, Editor científico ; Mikhail J. Atallah, Editor científico ; Marina Blanton, Editor científico ; Marina Blanton, Editor científico ; Marina Blanton, Editor científico . - Segunda edicicón . - Boca Raton : CRC Press, 2009 . - xiii, : paginas irregulares ; 25 cm. - (Chapman & Hall/CRC cryptography and network security) .
ISBN : 978-1-58488-820-8
Idioma : Inglés (eng)
Clasificación: 637.302 Nota de contenido: Computational geometry I -- Computational geometry II -- Computational topology -- Robot algorithms -- Vision and image processing algorithms -- Graph drawing algorithms -- Algorithmics in intensity-modulated radiation therapy -- VLSI layout algorithms -- Cryptographic foundations -- Encryption schemes -- Cryptanalysis -- Crypto topics and applications I -- Crypto topics and applications II -- Secure multiparty computation -- Voting schemes -- Auction protocols -- Pseudorandom sequences and stream ciphers -- Theory of privacy and anonymity -- Database theory: query languages -- Scheduling algorithms -- Computational game theory: an introduction -- Artificial intelligence search algorithms -- Algorithmic aspects of natural language processing -- Algorithmic techniques for regular networks of processors -- Parallel algorithms -- Self-stabilizing algorithms -- Theory of communication networks -- Network algorithmics -- Algorithmic issues in grid computing -- Uncheatable grid computing -- DNA computing: a research snapshot -- Computational systems biology -- Pricing algorithms for financial derivatives. Link: https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=106001
Algorithms and theory of computation handbook
Boca Raton : CRC Press - 2009
Computational geometry I -- Computational geometry II -- Computational topology -- Robot algorithms -- Vision and image processing algorithms -- Graph drawing algorithms -- Algorithmics in intensity-modulated radiation therapy -- VLSI layout algorithms -- Cryptographic foundations -- Encryption schemes -- Cryptanalysis -- Crypto topics and applications I -- Crypto topics and applications II -- Secure multiparty computation -- Voting schemes -- Auction protocols -- Pseudorandom sequences and stream ciphers -- Theory of privacy and anonymity -- Database theory: query languages -- Scheduling algorithms -- Computational game theory: an introduction -- Artificial intelligence search algorithms -- Algorithmic aspects of natural language processing -- Algorithmic techniques for regular networks of processors -- Parallel algorithms -- Self-stabilizing algorithms -- Theory of communication networks -- Network algorithmics -- Algorithmic issues in grid computing -- Uncheatable grid computing -- DNA computing: a research snapshot -- Computational systems biology -- Pricing algorithms for financial derivatives.
Reserva
Reservar este documento
Ejemplares (1)
Código de barras Signatura Tipo de medio Ubicación Sección Estado 23-1359-01 005.1 A85 2009 Libros Bib. Esp. Ing Sistemas Estanteria (Libros) Disponible Communication system security / Lidong Chen / Boca Raton : CRC Press (2012)
Título : Communication system security Tipo de documento: texto impreso Autores: Lidong Chen, Autor ; Guang Gong, Autor ; Guang Gong, Autor ; Guang Gong, Autor Mención de edición: Primera edición Editorial: Boca Raton : CRC Press Fecha de publicación: 2012 Colección: Chapman & Hall/CRC cryptography and network security Número de páginas: xix, 530 páginas Il.: diagramas, tablas Dimensiones: 24 cm ISBN/ISSN/DL: 978-1-4398-4036-8 Nota general: Incluye referencias bibliográficas al final de cada capítulo Idioma : Inglés (eng) Nota de contenido: Introduction -- Pseudorandom sequence generators -- Design of stream ciphers -- Design of block ciphers, hash functions, and MAC -- Public-key cryptographic algorithms -- Security infrastructure -- Establish protected communications -- Network security protocols -- Network access authentication -- Wireless network security -- Security for mobility -- Broadcast and multicast key distribution and authentication -- Trusted platform -- Physical-layer security -- Spread-spectrum techniques for anti-jamming attacks. Link: https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=106526 Communication system security [texto impreso] / Lidong Chen, Autor ; Guang Gong, Autor ; Guang Gong, Autor ; Guang Gong, Autor . - Primera edición . - Boca Raton : CRC Press, 2012 . - xix, 530 páginas : diagramas, tablas ; 24 cm. - (Chapman & Hall/CRC cryptography and network security) .
ISBN : 978-1-4398-4036-8
Incluye referencias bibliográficas al final de cada capítulo
Idioma : Inglés (eng)
Nota de contenido: Introduction -- Pseudorandom sequence generators -- Design of stream ciphers -- Design of block ciphers, hash functions, and MAC -- Public-key cryptographic algorithms -- Security infrastructure -- Establish protected communications -- Network security protocols -- Network access authentication -- Wireless network security -- Security for mobility -- Broadcast and multicast key distribution and authentication -- Trusted platform -- Physical-layer security -- Spread-spectrum techniques for anti-jamming attacks. Link: https://biblioteca.unap.edu.pe/opac_css/index.php?lvl=notice_display&id=106526
Communication system security
Chen, LidongGong, Guang ; Gong, Guang ; Gong, Guang - - Boca Raton : CRC Press - 2012
Incluye referencias bibliográficas al final de cada capítulo
Introduction -- Pseudorandom sequence generators -- Design of stream ciphers -- Design of block ciphers, hash functions, and MAC -- Public-key cryptographic algorithms -- Security infrastructure -- Establish protected communications -- Network security protocols -- Network access authentication -- Wireless network security -- Security for mobility -- Broadcast and multicast key distribution and authentication -- Trusted platform -- Physical-layer security -- Spread-spectrum techniques for anti-jamming attacks.
Reserva
Reservar este documento
Ejemplares (1)
Código de barras Signatura Tipo de medio Ubicación Sección Estado 23-1278-01 621.38928 Ch543 Libros Bib. Esp. Ing Sistemas Estanteria (Libros) Disponible