Table of contents 1. Cyberspace Security and Cryptography 2. Mathematical Preliminaries 3. Computational Preliminaries 4. Secret-Key Cryptography 5. Factoring Based Cryptography 6. Logarithm Based Cryptography 7. Elliptic Curve Cryptography 8. Quantum Safe Cryptography 9. Offensive Cryptography 10. Back Matter
Daftar Isi Bab 1. JCA/JCE dan provider 1.1. Pengantar 1.2. Menginstal provider bouncy castle 1.3. Cara kerja provider 1.4. Memeriksa kapabilitas provider Bab 2. Kriptografi kunci simetris 2.1. Contoh pertama 2.2. Kelas utilitas dasar 2.3. Menggunakan AES 2.4. Pengganjalan cipher block simetris 2.5. Mode-mode cipher block simetris 2.6. Mode-mode cipher block simetris aliran 2.7.…
Daftar Isi Bab 1. Pengantar kriptografi 1.1. Pengertian kriptografi 1.2. Sejarah kriptografi 1.3. Mekanisme kriptografi 1.4. Evaluasi Bab 2. Sistem kriptografi 2.1. Sistem kriptografi (cryptosystem) 2.2. Keamanan cryptosystem 2.3. Penggunaan cryptosystem 2.4. Evaluasi Bab 3. Dasar pemrograman MATLAB dan pengolahan citra 3.1. Dasar pemrograman MATLAB 3.2. Dasar pengolahan citr…
Abstract The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash function are reviewed. The information theoretic approach to authenticat…