Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 85 from your keywords: subject="Encryption"
First Page Previous 1 2 3 4 5 Next Last Page
cover
New directions of modern cryptography
Comment Share
Cao, Zhenfu

Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…

Edition
--
ISBN/ISSN
9781466501386
Collation
xv, 384 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CAO n
Availability1
Add to basket
MARC DownloadCite
cover
Digital watermarking and steganography: fundamentals and techniques
Comment Share
Shih, Frank Y.

Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …

Edition
Second Edition
ISBN/ISSN
9781498738767
Collation
xxii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SHI d
Availability0
Add to basket
MARC DownloadCite
cover
Blockchain: dari bitcoin untuk dunia
Comment Share
Dimaz Ankaa WijayaOscar Darmawan

DAFTAR ISI Bab 1 Pendahuluan 1.1. Cypherpunk 1.2. Uang 1.3. Basis data 1.4. Kriptografi Bab 2 Blockchain 2.1. Gambaran umum 2.2. Konsensus 2.3. Tipe blockchain 2.4. Keamanan Bab 3 Bitcoin 3.1. Sejarah bitcoin 3.2. Satoshi Nakamoto 3.3. Desentralisasi 3.4. Definisi bitcoin 3.5. Suplai terbatas 3.6. Transaksi bitcoin 3.7. Dompet bitcoin 3.8. Bitcoin blockchain explorer 3…

Edition
--
ISBN/ISSN
9786020823263
Collation
xv, 261 hal.; ilus.; 21 cm.
Series Title
--
Call Number
005.8 DIM b
Availability2
Add to basket
MARC DownloadCite
cover
Networked RFID systems and lightweight cryptography: raising barriers to prod…
Comment Share
Cole, Peter H.Ranasinghe, Damith C.

Contents: 1. Introduction 2. Anti-Counterfeiting and Securing Supply Chain security 3. Networked RFID Systems 4. EPC Network Architecture 5. Addressing insecurities and violations of privacy 6. RFID tag vulnerabilities in RFID systems 7. An evaluation framework 8. From Identification to Authentication- a review of RFID product authentication technique 9. EPC System for Safe and Secu…

Edition
First edition
ISBN/ISSN
9783540716402
Collation
viii, 355 hlm.; ilus.; 24 cm
Series Title
--
Call Number
621.384 COL n
Availability2
Add to basket
MARC DownloadCite
cover
Keamanan multimedia: konsep dan aplikasi
Comment Share
Dony Ariyus

Daftar isi: 1. PENDAHULUAN 1.1 Pendahuluan 1.2 Multimedia 1.3 Masalah keamanan 1.4 Ancaman keamanan 1.5 Aspek aspek keamanan komputer 2. PEMAHAMAN DASAR KEAMANAN MULTIMEDIA 2.1 Pendahuluan 2.2 Cryptography 2.3 Steganography 2.4 Digital watermarking 3. STEGANOGRAPHY 3.1 Pendahuluan 3.2 Sejarah steganography 3.3 Teknik steganography 3.4 Embeding methods 3.5 Method leaset 3…

Edition
Ed. I
ISBN/ISSN
9789792902891
Collation
xii, 338 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.82 DON k
Availability2
Add to basket
MARC DownloadCite
cover
Applied cryptanalysis: breaking ciphers in the real world
Comment Share
Stamp, MarkLow, Richard M.

Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra

Edition
--
ISBN/ISSN
9780470114865
Collation
xix, 401 hlm.; 24 cm.
Series Title
--
Call Number
005.82 STA a
Availability14
Add to basket
MARC DownloadCite
cover
Implementing SSL/TLS using cryptography and PKI
Comment Share
Davies, Joshua

Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…

Edition
--
ISBN/ISSN
9780470920411
Collation
xxxii, 663 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV i
Availability2
Add to basket
MARC DownloadCite
cover
Foundations of coding: compression, encryption, error correction
Comment Share
Dumas, Jean- GuillaumeRoch, Jean- LouisTannier, EricVarrette, Sebastien

Contents Introduction 1 Foundations of coding 1.1 From Julius Caesar to telecopy 1.2 Stream ciphers and probabilities 1.3 Block ciphers, algebra, and arithmetic 1.4 Decoding, decryption, attacks 2 Information theory and compression 2.1 Information theory 2.2 Statistical encoding 2.3 Heuristics of entropy reduction 2.4 Common compression codes 2.5 Lossy compression 3 Cryptolog…

Edition
--
ISBN/ISSN
9781118881446
Collation
xviii, 355 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 DUM s
Availability1
Add to basket
MARC DownloadCite
cover
Recent advances in RSA cryptography
Comment Share
Katzenbeisser, Stefan

Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures

Edition
--
ISBN/ISSN
9781461355502
Collation
xiii, 139 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAT r
Availability1
Add to basket
MARC DownloadCite
cover
Differential cryptanalysis on hash functions: theory and practice (attack alg…
Comment Share
Tao, XieFanbao, Liu

Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research

Edition
--
ISBN/ISSN
9783659612008
Collation
xiv, 362 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.82 TAO d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?