Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 85 from your keywords: subject="Encryption"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Internet security: cryptographic principles, algorithms, and protocols
Comment Share
Man, Young Rhee

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i
Availability9
Add to basket
MARC DownloadCite
cover
Modern cryptography primer: theoretical foundations dan practical applications
Comment Share
Koscielny, CzeslawKurkowski, MiroslawSrebrny, Marian

Contents 1 Basic concepts and historical overview 2 Mathematical foundations of cryptography 3 Foundations of symmetric cryptography 4 Foundations of asymmetric cryptography 5 An electronic signature and hash functions 6 PGP Systems and truecrypt 7 Public key infrastructure 8 Cryptographic protocols 9 Cryptographic applications for network security

Edition
--
ISBN/ISSN
9783642413858
Collation
xiv, 238 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 KOS m
Availability1
Add to basket
MARC DownloadCite
cover
Malicious cryptography: exposing cryptovirology
Comment Share
Young, AdamYung, Moti

Contents 1. Through Hacker’s Eyes 2. Cryptovirology 3. Tools for Security and Insecurity 3.1 Sources of Entropy 3.2 Entropy Extraction via Hashing 3.3 Unbiasing a Biased Coin 3.4 Combining Weak Sources of Entropy 3.5 Pseudorandom Number Generators 3.6 Uniform Sampling 3.7 Random Permutation Generation 3.8 Sound Approach to Random Number Generation and Use 3.9 RNGs Are the Beati…

Edition
--
ISBN/ISSN
764549758
Collation
xxiv, 392 hlm.; ilus.; 25 cm.
Series Title
--
Call Number
005.82 YOU m
Availability4
Add to basket
MARC DownloadCite
cover
IT security metrics: a practical framework for measuring security dan protect…
Comment Share
Hayden, Lance

Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…

Edition
--
ISBN/ISSN
9780071713412
Collation
xxvii, 368 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 HAY i
Availability1
Add to basket
MARC DownloadCite
cover
Advanced statistical steganalysis
Comment Share
Bohme, Rainer

Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other sec…

Edition
Second Edition
ISBN/ISSN
9783642143120
Collation
xv, 285 hal.; ilus.; 26 cm
Series Title
--
Call Number
005.82 BOH a
Availability2
Add to basket
MARC DownloadCite
cover
Understanding bitcoin: cryptography, engineering and economics
Comment Share
Franco, Pedro

Contents Part one: Introduction and economics Chapter 1 Foundation Chapter 2 Technology (Introduction) Chapter 3 Economics Chapter 4 Business applications Part Two: Bitcoin technology Chapter 5 Public key cryptography Chapter 6 Transactions Chapter 7 The blockchain Chapter 8 Wallets Chapter 9 Mining Part Three: The cryptocurrencies landscape Chapter 10 The origins of bitcoin C…

Edition
--
ISBN/ISSN
9781119019169
Collation
xx, 268 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 FRA u
Availability1
Add to basket
MARC DownloadCite
cover
Security without obscurity a guide to PKI operations
Comment Share
Stapleton, J. J.Epstein, W. Clay

Contents 1 Introduction 2 Cryptography basics 3 PKI building blocks 4 PKI management and security 5 PKI roles and responsibilities 6 Security considerations 7 Operational considerations 8 Incident management 9 PKI governance, risk, and compliance 10 Advanced PKI

Edition
--
ISBN/ISSN
9781498707473
Collation
xv, 343 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 STA s
Availability1
Add to basket
MARC DownloadCite
cover
Security of block ciphers: from algorithm design to hardware implementation
Comment Share
Kazuo, SakiyamaYu, SasakiYang, Li

Contents 1 Introduction to block ciphers 2 Introduction to digital circuits 3 Handware implementation for block ciphers 4 Cryptanalysis on block ciphers 5 Side-channel analysis and fault analysis on block ciphers 6 Advanced fault analysis with techniques from cryptanalysis 7 Countermeasures against side-channel analysis and fault analysis

Edition
--
ISBN/ISSN
9781118660010
Collation
ix, 295 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 KAZ s
Availability1
Add to basket
MARC DownloadCite
cover
New stream cipher designs: the eSTREAM finalists
Comment Share
Robshaw, MatthewBillet, Olivier

Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…

Edition
--
ISBN/ISSN
9783540683506
Collation
viii, 293 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 ROB n
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, Anish

Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…

Edition
--
ISBN/ISSN
9783642077166
Collation
xxiv, 320 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BOY p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?