Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 63 from your keywords: subject="Data Encryption (Comp...
1 2 3 4 5 Next Last Page
cover
Pseudorandomness and cryptographic applications
Comment Share
Michael Luby.

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that “looks” just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functi…

Edition
-
ISBN/ISSN
9780691025469
Collation
xvi, 234 hal : 23 cm
Series Title
-
Call Number
005.82 LUB p
Availability2
Add to basket
MARC DownloadCite
cover
Java untuk kriptografi
Comment Share
Sianipar, R.H.

Daftar Isi Bab 1. JCA/JCE dan provider 1.1. Pengantar 1.2. Menginstal provider bouncy castle 1.3. Cara kerja provider 1.4. Memeriksa kapabilitas provider Bab 2. Kriptografi kunci simetris 2.1. Contoh pertama 2.2. Kelas utilitas dasar 2.3. Menggunakan AES 2.4. Pengganjalan cipher block simetris 2.5. Mode-mode cipher block simetris 2.6. Mode-mode cipher block simetris aliran 2.7.…

Edition
Ed. I
ISBN/ISSN
9789792958836
Collation
vi, 218 hal.; ilus.; 23 cm + 1 CD
Series Title
--
Call Number
005.82 SIA j
Availability9
Add to basket
MARC DownloadCite
cover
Prosiding- constructive side-channel analysis and secure design: 13th interna…
Comment Share
O'flynn, ColinBalasch, Josep

his book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation …

Edition
-
ISBN/ISSN
9783030997663
Collation
279 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS BAL p
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in java: creating and programming advanced alg…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptograph…

Edition
-
ISBN/ISSN
9781484281055
Collation
x, 227 hal :23 cm
Series Title
--
Call Number
005.82 STE c
Availability2
Add to basket
MARC DownloadCite
cover
Asymmetric cryptography: primitives and protocols
Comment Share
Pointcheval, David

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairing…

Edition
-
ISBN/ISSN
9781394188345
Collation
x, 448 hal : 23cm
Series Title
--
Call Number
005.84 POI a
Availability2
Add to basket
MARC DownloadCite
cover
Algebraic cryptanalysis
Comment Share
Bard, Gregory V.

Contents 1 Introduction: how to use this book Part I Cryptanalysis 2 The block cipher keeloq and algebraic attacks 3 The fixed-point attack 4 Iteratrd permutations 5 Stream ciphers Part II Linear systems mod 2 6 Some basic facts about linear algebra over GF (2) 7 The complexity of GF (2)-matrix operations 8 On the exponent of certain matrix operations 9 The method of fou…

Edition
--
ISBN/ISSN
9780387887562
Collation
xxxiii, 356 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BRA a
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Mihailescu, Marius IulianNita, Stefania Loredana

Table of contents About the Authors About the Technical Reviewer Acknowledgments Part I. Foundations 1. Getting Started in Cryptography and Cryptanalysis 2. Cryptography Fundamentals 3. Mathematical Background and Its Applicability 4. Large Integer Arithmetic 5. Floating-Point Arithmetic 6. New Features in C++20 7. Secure Coding Guidelines 8. Cryptography Libraries in C/C++20 P…

Edition
-
ISBN/ISSN
9781484265857
Collation
xvii, 469 hlm.; ilus.; 25,3 cm
Series Title
-
Call Number
005.262 MIH p
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography arithmetic: algorithms and hardware architectures (advances in i…
Comment Share
Omondi, Amos R.

This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…

Edition
-
ISBN/ISSN
9783030341411
Collation
xiv, 336 hlm.: ilus.; 24 cm
Series Title
Advances in Information Security Book 77
Call Number
005.82 OMO c
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?