Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 85 from your keywords: subject="Encryption"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Feistel ciphers : security proofs and cryptanalysis
Comment Share
Nachef, ValeriePatarin, JacquesVolte, Emmanuel

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2,…

Edition
-
ISBN/ISSN
9783319495286
Collation
xv, 309 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.82 NAC f
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Quantum computational number theory
Comment Share
Yan, Song Y.

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…

Edition
-
ISBN/ISSN
9783319798462
Collation
ix, 252 hlm.: ilus.; 23 cm
Series Title
-
Call Number
512.7 YAN q
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi secure storage menggunakan metode full disk encryption dan tampe…
Comment Share
Andriani Adi LestariDesi MarlenaMagfirawatyBarok Rizqi Aladhirus

Saat ini pengembangan storage telah berubah menjadi penyimpanan berbasis internet atau yang dikenal dengan cloud storage sebagai media penyimpanan online. Cloud storage lebih banyak diminati oleh masyarakat umum karena memiliki beberapa kelebihan, di antaranya ketika penyimpanan pada personal computer habis, pengguna tidak perlu membeli perangkat penyimpanan baru ataupun mengeluarkan biaya tamb…

Edition
--
ISBN/ISSN
--
Collation
xvi,62 hlm
Series Title
-
Call Number
2021 BAR i
Availability2
Add to basket
MARC DownloadCite
cover
Post-quantum cryptography
Comment Share
Bernstein, Daniel J.Buchmann, JohannesDahmen, Erik

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …

Edition
-
ISBN/ISSN
9783540887010
Collation
viii, 245 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
R005.82 BER p
Availability3
Add to basket
MARC DownloadCite
cover
Writing secure code
Comment Share
Howard, Michael

Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…

Edition
Second Edition
ISBN/ISSN
0735617228
Collation
xxviii, 768 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 HOW w
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability0
Add to basket
MARC DownloadCite
cover
Kriptografi dan implementasinya menggunakan MATLAB
Comment Share
Emy Setyaningsih

Daftar Isi Bab 1. Pengantar kriptografi 1.1. Pengertian kriptografi 1.2. Sejarah kriptografi 1.3. Mekanisme kriptografi 1.4. Evaluasi Bab 2. Sistem kriptografi 2.1. Sistem kriptografi (cryptosystem) 2.2. Keamanan cryptosystem 2.3. Penggunaan cryptosystem 2.4. Evaluasi Bab 3. Dasar pemrograman MATLAB dan pengolahan citra 3.1. Dasar pemrograman MATLAB 3.2. Dasar pengolahan citr…

Edition
Ed. I
ISBN/ISSN
9789792951516
Collation
xxii, 250 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.82 EMY k
Availability1
Add to basket
MARC DownloadCite
cover
Multimedia information hiding technologies and methodologies for controlling …
Comment Share
Kondo, Kazuhiro

Contents: Section 1 Information hiding for audio and speech Chapter 1 Information hiding for audio and signals Chapter 2 Reversible audio data hiding in spectral and time domains Chapter 3 Method of digital-audio watermarking basec on cochlear delay characteristics Chapter 4 Information hiding using interpolation for audio and speech signals Chapter 5 Acoustic OFDM technology ans …

Edition
--
ISBN/ISSN
9781466622173
Collation
xxii, 473 hal.; ilus.; 29 cm
Series Title
--
Call Number
005.82 KON m
Availability1
Add to basket
MARC DownloadCite
cover
Information hiding text in image: encryption
Comment Share
Hasan, HaithamKareem, Sameem AbdulJaleel, Jane

Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…

Edition
--
ISBN/ISSN
9783659288487
Collation
xv, 88 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 HAS i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?