Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 66 from your keywords: subject="Kriptografi"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Quantum computational number theory
Comment Share
Yan, Song Y.

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…

Edition
-
ISBN/ISSN
9783319798462
Collation
ix, 252 hlm.: ilus.; 23 cm
Series Title
-
Call Number
512.7 YAN q
Availability1
Add to basket
MARC DownloadCite
cover
Bahan ajar teknik manajemen kunci
Comment Share
Rizka KhairunnisaAndriani Adi LestariYeni Farida

Modul 1 PENGANTAR MANAJEMEN KUNCI A. Layanan Keamanan Informasi 1. Kerahasiaan 2. Integritas Data 3. Otentikasi 4. Otorisasi 5. Anti-penyangkalan 6. Layanan-layanan Pendukung 7. Kombinasi Layanan B. Algoritma Kriptografi C. Konsep Manajemen Kunci D. Tipe Kunci dan Informasi Lain terkait Kunci 1. Jenis Kunci Kriptografi 2. Informasi Lain yang berelasi dengan …

Edition
-
ISBN/ISSN
-
Collation
ix, 88 hlm.; ilus.; 30 cm
Series Title
-
Call Number
652.8 AND b
Availability2
Add to basket
MARC DownloadCite
cover
Modifikasi tanda tangan digital pada skema ESIGN berbasis Kurva Eliptik
Comment Share
Sri RosdianaEvie Sri WahyuniNia YuliantiSa'aadah Sajjana Carita

Tanda tangan digital memiliki peran yang penting di era digital, dimana semua orang beralih menjadi paperless. Banyak peneliti kriptografi yang mendukung perkembangan digital dengan cara membuat skema kriptografi yang aman digunakan, dan salah satunya adalah tanda tangan digital. Pada Tugas Akhir ini, diajukan skema tanda tangan digital berbasis kurva eliptik modulo ??, dengan ?? = ??2?? sedemi…

Edition
--
ISBN/ISSN
--
Collation
xvi, 42 hlm
Series Title
-
Call Number
2021 EVI m
Availability2
Add to basket
MARC DownloadCite
cover
Kriptografi dan implementasinya menggunakan MATLAB
Comment Share
Emy Setyaningsih

Daftar Isi Bab 1. Pengantar kriptografi 1.1. Pengertian kriptografi 1.2. Sejarah kriptografi 1.3. Mekanisme kriptografi 1.4. Evaluasi Bab 2. Sistem kriptografi 2.1. Sistem kriptografi (cryptosystem) 2.2. Keamanan cryptosystem 2.3. Penggunaan cryptosystem 2.4. Evaluasi Bab 3. Dasar pemrograman MATLAB dan pengolahan citra 3.1. Dasar pemrograman MATLAB 3.2. Dasar pengolahan citr…

Edition
Ed. I
ISBN/ISSN
9789792951516
Collation
xxii, 250 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.82 EMY k
Availability1
Add to basket
MARC DownloadCite
cover
Kriptografi untuk keamanan jaringan
Comment Share
Rifki Sadikin

Daftar isi: 1 Pengantar Kriptografi dan Keamanan Jaringan 2 Kriptografi Klasik 3 Matematika untuk Kriptografi Kunci Simetri 4 Data Encryption System (DES) 5 Advanced Encryption Standard (AES) 6 Mode Operasi, dan Sistem Sandi Stream 7 Teori Bilangan untuk Kriptografi Kunci Publik 8 Sistem Kriptografi Kunci Publik 9 Fungsi Hash untuk Kriptografi 10 Digital Signature

Edition
Ed. I
ISBN/ISSN
9789792931280
Collation
xx, 392 hal.: ilus.; 23 cm
Series Title
--
Call Number
005.82 RIF k
Availability10
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Contents: Chapter 1. Introduction Section 1.1. Security Trends Section 1.2. The OSI Security Architecture Section 1.3. Security Attacks Section 1.4. Security Services Section 1.5. Security Mechanisms Section 1.6. A Model for Network Security Section 1.7. Recommended Reading and Web Sites Section 1.8. Key Terms, Review Questions, and Problems Part One: Symmetric Ciphers Chapter…

Edition
Fourth Edition
ISBN/ISSN
9780131873162
Collation
xvi, 680 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 STA C
Availability1
Add to basket
MARC DownloadCite
cover
Emotional intelligence = kecerdasan emosional : mengapa EI lebih penting dari…
Comment Share
Goleman, DanielT. HermayaTere Liye)

terdapat Index dan Catatan Buku ini berpendapat bahwa pandangan kita tentang kecerdasan manusia it terlalu sempit, mengabaikan serangkaian penting kemampuan yang sangat besar pengaruhnya dalam menentukan keberhasila kita dalam kehidupan

Edition
null
ISBN/ISSN
9796054086
Collation
526 hlm; ilus; 22 cm
Series Title
--
Call Number
153.9 GOL e
Availability1
Add to basket
MARC DownloadCite
cover
Kriptografi keamanan internet dan jaringan komunikasi
Comment Share
Okumura, ToshieWiryosumarto, HarsonoYusuf Kurniawan

DAFTAR ISI:
1. Pendahuluan
Komunikasi
Aspek-aspek keamanan
Algoritma dan kunci
Cryptanalysis
Macam-macam algoritma kriptografi
Macam-macam serangan cryptanalyst
Keamanan algoritma
2. Algoritma kriptografi klasik
Teknik subtitusi
Subtitusi deret campuran kata kunci
Subtitusi monomer-dinome-trinome
Subtitusi multilatera…

Edition
null
ISBN/ISSN
9793338164
Collation
x, 316 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 YUS k
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography theory and practice
Comment Share
Stinson, Douglas R.

Catatan: Terdapat Index Table of Contents: 1. Classical Cryptography 2. Shannon

Edition
Third Edition
ISBN/ISSN
9781584885085
Collation
293 hlm; ilus; 24 cm
Series Title
Discrete Mathematics and Its Application
Call Number
005.82 STI c
Availability7
Add to basket
MARC DownloadCite
cover
Recent advances in RSA cryptography
Comment Share
Katzenbeisser, Stefan

Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures

Edition
--
ISBN/ISSN
9781461355502
Collation
xiii, 139 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAT r
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?