Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 88 from your keywords: subject="Encryption"
First Page Previous 6 7 8 9 Next Last Page
cover
Security of block ciphers: from algorithm design to hardware implementation
Comment Share
Kazuo, SakiyamaYu, SasakiYang, Li

Contents 1 Introduction to block ciphers 2 Introduction to digital circuits 3 Handware implementation for block ciphers 4 Cryptanalysis on block ciphers 5 Side-channel analysis and fault analysis on block ciphers 6 Advanced fault analysis with techniques from cryptanalysis 7 Countermeasures against side-channel analysis and fault analysis

Edition
--
ISBN/ISSN
9781118660010
Collation
ix, 295 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 KAZ s
Availability1
Add to basket
MARC DownloadCite
cover
New stream cipher designs: the eSTREAM finalists
Comment Share
Robshaw, MatthewBillet, Olivier

Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…

Edition
--
ISBN/ISSN
9783540683506
Collation
viii, 293 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 ROB n
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, Anish

Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…

Edition
--
ISBN/ISSN
9783642077166
Collation
xxiv, 320 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Homomorphic encryption and applications
Comment Share
Paulet, RussellBertino, ElisaXun Yi

1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…

Edition
--
ISBN/ISSN
9783319122281
Collation
xii, 126 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XUN h
Availability1
Add to basket
MARC DownloadCite
cover
Network performance and security: testing and analyzing using open source and…
Comment Share
Chapman, Chris

Contents: 1. Introduction to practical security and performance testing 2. Getting organized with initial audit of tnetworkwrk 3. Locking down the infrastructure: internet, wi-fi, wired, VPN, WAN, and the core 4. Locking down and optimizing the Windows client 5. Server patterns 6. Testing for security flaws using penetration testing 7. Using Wireshark and TCP Dump to visualize traffic 8…

Edition
--
ISBN/ISSN
9780128035849
Collation
xiv, 366 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.82 CHA n
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security:principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Third Edition (International Edition)
ISBN/ISSN
9780131115026
Collation
xiv, 681 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Algebraic aspects of the advanced encryption standard
Comment Share
Cid, CarlosMurphy, SeanRobshaw, Matthew

Contents: INTRODUCTION TO THE AES MATHEMATICAL BACKGROUND DESCRIPTION OF THE AES ALGEBRAIC PROPERTIES OF THE AES EQUATION SYSTEMS FOR THE AES ANALYSIS OF AES EQUATION SYSTEMS CLOSING REMARKS

Edition
-
ISBN/ISSN
9780387243634
Collation
141 hlm.; 25 cm.
Series Title
-
Call Number
512.1 CID a
Availability1
Add to basket
MARC DownloadCite
cover
Analysis and design of cryptographic hash functions
Comment Share
Preneel, Bart

Abstract The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash function are reviewed. The information theoretic approach to authenticat…

Edition
-
ISBN/ISSN
--
Collation
xvii, 323 hlm.; 29 cm.
Series Title
-
Call Number
005.82 PRE a
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Jajodia, SushilTilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9781441959058
Collation
xl, 1416 hlm.; 26 cm
Series Title
-
Call Number
R005.803 TIL e
Availability2
Add to basket
MARC DownloadCite
cover
Black-box models of computation in cryptology
Comment Share
Jager, Tibor

Introduction -- Black-Box Models of Computation -- On Black-Box Ring Extraction and Integer Factorization -- Analysis of Cryptographic Assumptions in the Generic Ring Model -- The Generic Composite Residuosity Problem -- Semi-Generic Groups and Their Applications.

Edition
-
ISBN/ISSN
9783834819895
Collation
xii, 86 hlm.; 26 hlm.
Series Title
-
Call Number
005.82 JAG b
Availability2
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?