Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 88 from your keywords: subject="Encryption"
1 2 3 4 5 Next Last Page
cover
The code book: the evolution of secrecy from mary queen of scots to quantum c…
Comment Share
Singh, Simon

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisi…

Edition
-
ISBN/ISSN
9780385495318
Collation
xiii, 401 hlm.; 24 cm.
Series Title
-
Call Number
652.809 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
System-on-Chip architectures and implementations for private-Key data encryption
Comment Share
Máire McLoone ,John V. McCanny

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and e…

Edition
-
ISBN/ISSN
9780306478826
Collation
vi, 160 hal ; ilus ; 23 cm
Series Title
-
Call Number
005.8 MCL s
Availability1
Add to basket
MARC DownloadCite
cover
Understanding cryptography : a textbook for students and practitioners
Comment Share
Paar, ChristofCraig, Allen T.McKean, Joseph W.Pelzl, Jan

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. Af…

Edition
first
ISBN/ISSN
9783642041006
Collation
xviii, 372 p. : ill. ; 24 cm
Series Title
null
Call Number
005.82 PAA u
Availability2
Add to basket
MARC DownloadCite
cover
Pseudorandomness and cryptographic applications
Comment Share
Michael Luby.

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that “looks” just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functi…

Edition
-
ISBN/ISSN
9780691025469
Collation
xvi, 234 hal : 23 cm
Series Title
-
Call Number
005.82 LUB p
Availability2
Add to basket
MARC DownloadCite
cover
Java untuk kriptografi
Comment Share
Sianipar, R.H.

Daftar Isi Bab 1. JCA/JCE dan provider 1.1. Pengantar 1.2. Menginstal provider bouncy castle 1.3. Cara kerja provider 1.4. Memeriksa kapabilitas provider Bab 2. Kriptografi kunci simetris 2.1. Contoh pertama 2.2. Kelas utilitas dasar 2.3. Menggunakan AES 2.4. Pengganjalan cipher block simetris 2.5. Mode-mode cipher block simetris 2.6. Mode-mode cipher block simetris aliran 2.7.…

Edition
Ed. I
ISBN/ISSN
9789792958836
Collation
vi, 218 hal.; ilus.; 23 cm + 1 CD
Series Title
--
Call Number
005.82 SIA j
Availability9
Add to basket
MARC DownloadCite
cover
Prosiding- constructive side-channel analysis and secure design: 13th interna…
Comment Share
O'flynn, ColinBalasch, Josep

his book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation …

Edition
-
ISBN/ISSN
9783030997663
Collation
279 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS BAL p
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in java: creating and programming advanced alg…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptograph…

Edition
-
ISBN/ISSN
9781484281055
Collation
x, 227 hal :23 cm
Series Title
--
Call Number
005.82 STE c
Availability2
Add to basket
MARC DownloadCite
cover
Asymmetric cryptography: primitives and protocols
Comment Share
Pointcheval, David

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairing…

Edition
-
ISBN/ISSN
9781394188345
Collation
x, 448 hal : 23cm
Series Title
--
Call Number
005.84 POI a
Availability2
Add to basket
MARC DownloadCite
cover
Encrypt, sign, attack: a compact introduction to cryptography
Comment Share
Manz, Olaf

This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In ea…

Edition
Vol. 4
ISBN/ISSN
9783662660157
Collation
x, 134 hal : 23cm
Series Title
Mathematics Study Resources Series
Call Number
005.82 MAN e
Availability2
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?