Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 85 from your keywords: subject="Encryption"
First Page Previous 6 7 8 9 Next Last Page
cover
Introduction to identity-based encryption
Comment Share
Martin, Luther

Contents Basic Mathematical Concepts and Properties Properties of Elliptic Curves Divisors and the Tate Pairing Cryptography and Computational Complexity Related Cryptographic Algorithms The Cocks IBE Scheme Boneh-Franklin IBE Boneh-Boyen IBE Sakai-Kasahara IBE Hierarchical IBE and Master Secret Sharing Calculating Pairings

Edition
-
ISBN/ISSN
9781596932388
Collation
xiv, 231 hlm.; 25 cm.
Series Title
-
Call Number
005.82 MAR i
Availability2
Add to basket
MARC DownloadCite
cover
Innovative Cryptography
Comment Share
Moldovyan, AlexMoldovyan, Nick

Edition
Second Edition
ISBN/ISSN
1584504676
Collation
xiii, 386 hlm.; 23 cm.
Series Title
-
Call Number
005.82 MOL i

Edition
Second Edition
ISBN/ISSN
1584504676
Collation
xiii, 386 hlm.; 23 cm.
Series Title
-
Call Number
005.82 MOL i
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Kahate, Atul

Edition
-
ISBN/ISSN
7302099677
Collation
xii, 435 hlm.; 23 cm.
Series Title
-
Call Number
005.82 KAH c

Edition
-
ISBN/ISSN
7302099677
Collation
xii, 435 hlm.; 23 cm.
Series Title
-
Call Number
005.82 KAH c
Availability1
Add to basket
MARC DownloadCite
cover
A statistical test suite for random and pseudorandom number generators for cr…
Comment Share
Banks, DavidBarker, AlaineBassham III, Lawrence EDray, JamesHeckert, AlanLeigh, StefanLevenson, MarkNechvatal, JamesRukhin, AndrewSmid, MilesSoto, JuanVangel, MarkVo, San

Edition
Special Publication 800-22, Revision 1
ISBN/ISSN
-
Collation
vii, 113 hlm.; 25 cm.
Series Title
-
Call Number
R005.82 DEP s

Edition
Special Publication 800-22, Revision 1
ISBN/ISSN
-
Collation
vii, 113 hlm.; 25 cm.
Series Title
-
Call Number
R005.82 DEP s
Availability2
Add to basket
MARC DownloadCite
cover
RSA security's official guide to cryptography
Comment Share
Burnett, StevePaine, Stephen

Edition
-
ISBN/ISSN
72192259
Collation
xxi, 419 hlm.; 25 cm.
Series Title
-
Call Number
005.82 BUR r

Edition
-
ISBN/ISSN
72192259
Collation
xxi, 419 hlm.; 25 cm.
Series Title
-
Call Number
005.82 BUR r
Availability1
Add to basket
MARC DownloadCite
cover
Quantum cryptography and secret-key distillation
Comment Share
Assche, Gilles Van

Edition
-
ISBN/ISSN
9780521864855
Collation
xii, 261 hlm.; 25 cm.
Series Title
-
Call Number
005.82 ASS q

Edition
-
ISBN/ISSN
9780521864855
Collation
xii, 261 hlm.; 25 cm.
Series Title
-
Call Number
005.82 ASS q
Availability3
Add to basket
MARC DownloadCite
cover
The Hash function BLAKE
Comment Share
Aumasson, Jean-PhilippeHenzen, LucaMeier, WiliPhan, Raphael C.-W.

CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…

Edition
-
ISBN/ISSN
9783662447567
Collation
Berlin
Series Title
Information Security and Crypography
Call Number
005.8 AUM h
Availability1
Add to basket
MARC DownloadCite
cover
Everyday cryptography : fundamental principles and applications
Comment Share
Martin, Keith M

Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…

Edition
-
ISBN/ISSN
9780199695591
Collation
xxi, 530 hlm.: ilus.; 23 cm.
Series Title
-
Call Number
652.8 MAR e
Availability1
Add to basket
MARC DownloadCite
cover
KAJIAN MATEMATIS PEMANFAATAN QUADRATIC RESIDUE PADA SKEMA CLIFFORD COCKS' IDE…
Comment Share
SITI ZAIMRahmi Rusin, S.Si, M Sc tech.

Identity based encryption merupakan algoritma asimetrik yang menggunakan identitas sebagai kunci publik. Pada tahum 2001, Clifford Cocks mengajukan Identity Based Encryption Scheme Based on Quadratic Residues. Pada penelitian tugas akhir ini dilakukan pengkajian secara matematis terhadap quadratic residue pada skema tersebut dan dibuat simulasi setiap tahapan pada skema tersebut mengg…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2009 SIT k
Availability0
Add to basket
MARC DownloadCite
cover
PENERAPAN IDENTITY BASED FUNGSI ENCRYPTION DENGAN FUNGSI TATE PAIRING PADA LO…
Comment Share
RIKSON GULTOM

Aplikasi di internet dapat digunakan oleh siapa saja yang tersambung ke jaringan tersebut. User dapat menggunakan aplikasi internet, bila yang bersangkutan memiliki hak akses. Salah satu perlindungan keamanan akses penggunaan aplikasi adalah dengan menggunakan login. Tetapi, teknik login biasa memiliki beberapa kelemahan, antara lain rentan terhadap pencurian password dengan menggunakan teknik…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2009 RIK p
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?