Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 160 from your keywords: subject="Cryptography"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Security, Privacy, and Applied Cryptography Engineering : 12th International …
Comment Share
Batina, LejlaMondal, MainackPicek, Stjepan

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key crypt…

Edition
-
ISBN/ISSN
9783031228292
Collation
340 hal ; 23cm
Series Title
-
Call Number
005.8 BAT s
Availability1
Add to basket
MARC DownloadCite
cover
Asymmetric cryptography: primitives and protocols
Comment Share
Pointcheval, David

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairing…

Edition
-
ISBN/ISSN
9781394188345
Collation
x, 448 hal : 23cm
Series Title
--
Call Number
005.84 POI a
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography algorithms: a guide to algorithms in blockchain, quantum cryptog…
Comment Share
Bertaccin, Massimo

Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …

Edition
-
ISBN/ISSN
9781789618570
Collation
xvii, 340 hlm : 23 cm
Series Title
--
Call Number
652.8 BER c
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi Secret Sharing Berbasis Visual Cryptography Menggunakan Citra RGB
Comment Share
Sri RosdianaMareta Wahyu ArdyaniSa'aadah Sajjana CaritaYafi' Athallah Yuwandana

Keamanan data merupakan isu penting dalam berbagai bidang, termasuk dalam penyimpanan dan transmisi data. Salah satu metode untuk meningkatkan keamanan data adalah dengan menggunakan teknik secret sharing. Teknik secret sharing membagi data rahasia menjadi beberapa bagian, yang disebut share, dan mendistribusikannya kepada beberapa pihak. Visual Cryptography (VC) merupakan salah satu implementa…

Edition
-
ISBN/ISSN
--
Collation
xviii, 203 hal
Series Title
-
Call Number
2024 YAF i
Availability2
Add to basket
MARC DownloadCite
cover
Scheefoo : Sponge Cellular Automata Hash Function Optimization
Comment Share
Bety Hayat SusantiSanti IndarjaniSandy Tri KurniaUha Isnaini

Fungsi hash adalah salah satu kriptografi primitif yang banyak digunakan pada perangkat IoT yang dapat menyediakan layanan integritas dan autentikasi dalam membantu menjaga data dan keamanan. Perangkat IoT memiliki keterbatasan daya, memori, dan kapasitas komputasi sehingga kebutuhan akan fungsi hash yang efisien dan ringan menjadi semakin kritis. Penelitian ini mengusulkan sebuah pengembangan …

Edition
-
ISBN/ISSN
-
Collation
xvi, 80 hal
Series Title
-
Call Number
2024 SAN s
Availability2
Add to basket
MARC DownloadCite
cover
Serangan Aljabar pada Satu Round Algoritma QTL: A New Ultra-lightweight Block…
Comment Share
Bety Hayat SusantiSanti IndarjaniNadia Paramita Retno AdiatiLaila Nur Khofifah

Kriptografi merupakan ilmu tentang teknik-teknik matematika yang berkaitan dengan aspek-aspek atau layanan keamanan informasi seperti kerahasiaan, integritas data, autentikasi entitas, dan autentikasi asal data. Algoritma kriptografi diharapkan dapat memenuhi nilai efisiensi biaya dan kinerja. Akan tetapi dalam implementasinya, tidak semua algoritma kriptografi dapat memenuhi tujuan efisi…

Edition
-
ISBN/ISSN
--
Collation
xvii, 52 hal
Series Title
-
Call Number
2024 LAI s
Availability2
Add to basket
MARC DownloadCite
cover
Desain Hash-Deterministic Random Bit Generator (Hash-DRBG) Berbasis Fungsi Ha…
Comment Share
Bety Hayat SusantiSanti IndarjaniNia YuliantiLuthfi Hakim P

Standardisasi penggunaan algoritma lightweight cryptography pada perangkat Internet of Things (IoT) menjadi salah satu fokus penelitian kriptografi saat ini. Algoritma lightweight cryptography yang ditetapkan sebagai standar NIST pada tahun 2023 adalah algoritma Ascon. Tantangan terbaru yang diusulkan NIST dalam dokumen final NIST IR 8454 terhadap algoritma Ascon adalah evaluasi penerapa…

Edition
-
ISBN/ISSN
--
Collation
xix + 60 hal
Series Title
-
Call Number
2024 LUT d
Availability2
Add to basket
MARC DownloadCite
cover
Cryptographic Libraries for Developers
Comment Share
Ed MoyleDiana Kelley

Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familia…

Edition
-
ISBN/ISSN
9781584504092
Collation
-
Series Title
programing series
Call Number
005.1 MOY c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Introduction to modern cryptography, tird edition
Comment Share
Jonathan katzYehuda Lindell

Introduction to Modern Cryptography is an introductory-level treatment of cryptography written from a modern, computer science perspective. It is unique in its blend of theory and practice, covering standardized cryptosystems widely used in practice without sacrificing rigor or an emphasis on foundations. It is intended to be used as a textbook in undergraduate- or graduate-level introductory c…

Edition
Third edition
ISBN/ISSN
9780815354369
Collation
xx, 626 hal : 26 cm
Series Title
-
Call Number
005.8 KAT i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?