Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 19595 dokumen yang sesuai dengan query
cover
Katz, Jonathan, 1974-
"ryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/​ECDSA and DHIES/​ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study."
Boca Raton: CRC Press, 2015
005.82 KAT i
Buku Teks  Universitas Indonesia Library
cover
Seberry, Jennifer, 1944-
New York: Prentice-Hall, 1989
005.8 SEB c
Buku Teks  Universitas Indonesia Library
cover
"Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board."
Berlin: Springer-Verlag, 2012
e20409533
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation, (blind) signatures and threshold encryption, zero-knowledge and security models, leakage-resilience, hash functions, differential privacy, pseudorandomness, dedicated encryption, security amplification, and resettable and parallel zero knowledge."
Berlin : Springer-Verlag, 2012
e20410607
eBooks  Universitas Indonesia Library
cover
Tanenbaum, Andrew S., 1944-
"This edition incorporates the latest developments in operating systems (OS) technologies. It includes up-to-date materials on relevant OS and provides information on current research based on the author's experience as an operating systems researcher. Modern Operating Systems, Third Edition was the recipient of the 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time. This program will provide a better teaching and learning experience-for you and your students. It will help: Provide Practical Detail on the Big Picture Concepts ; A clear and entertaining writing style outlines the concepts every OS designer needs to master ; Keep Your Course Current: This edition includes information on the latest OS technologies and developments ; Enhance Learning with Student and Instructor Resources: Students will gain hands-on experience using the simulation exercises and lab experiments"
Harlow, Essex: Pearson, 2015
005.43 TAN m
Buku Teks  Universitas Indonesia Library
cover
Tanenbaum, Andrew S., 1944-
New Jersey: Pearson, 2015
005.43 TAN m
Buku Teks  Universitas Indonesia Library
cover
Chatterjee, Ayantika
"This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the cloud. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications."
Singapore: Springer Nature, 2019
e20508880
eBooks  Universitas Indonesia Library
cover
Tanenbaum, Andrew S., 1944-
Englewood Cliffs, NJ: Prentice-Hall, 1992
005.43 TAN m (1)
Buku Teks  Universitas Indonesia Library
cover
Elfrin Erawan
"Kondisi pandemi COVID-19 mendorong infrastruktur teknologi informasi dibangun dengan waktu yang cepat dan dalam sekala besar. Peningkatan pengiriman server secara global meningkat hampir 37% pada kuartal pertama tahun 2020. Hampir 80% server yang ada didominasi oleh linux sebagai sistem operasinya. Ubuntu merupakan salah satu distribusi linux yang banyak digunakan untuk sistem operasi server. Salah satu aspek yang penting dalam sistem operasi server adalah tingkat keamanan dari sistem operasi server tersebut. Keamanan sistem operasi server perlu diperhatikan pasalnya server umumnya berisi data-data penting, oleh karena itu peningkatan keamanan server perlu diperhatikan untuk mencegah data-data penting ini bocor atau berpindah tangan ke pihak yang salah. CIS adalah salah satu badan yang sangat peduli terhadap keamanan di internet, mengeluarkan acuan penguatan keamanan sistem operasi server yang dikenal dengan CIS Benchmark. penelitian ini bertujuan untuk meningkatkan keamanan sistem operasi Ubuntu 20.04 dengan menggunakan kontrol penguatan keamanan berdasarkan standar CIS Benchmark versi 1.1.0 dengan metode otomatisasi menggunakan aplikasi Packer. Metode otomatisasi yang dilakukan selain melakukan penguatan juga menghasilkan image mesin virtual yang siap digunakan untuk pengimplementasian sebuah sistem dengan besar file image berukuran 1,8 GB. Selanjutnya untuk validasi penguatan keamanan maka dilakukan audit menggunakan aplikasi CIS-CAT Lite yang menghasilkan nilai skor kesesuaian audit sebanyak 218 kontrol atau 99,54% dari total 219 kontrol yang ada pada CIS Benchmark versi 1.1.0.

The COVID-19 pandemic has driven the rapid and large-scale development of information technology infrastructure. Global server shipments increased by nearly 37% in the first quarter of 2020. Approximately 80% of the existing servers are dominated by Linux as their operating system. Ubuntu is one of the widely used Linux distributions for server operating systems. One crucial aspect of server operating systems is their security level. Security of server OS needs to be considered, as servers typically contain important data. Therefore, improving server security is necessary to prevent the leakage or unauthorized access of this critical data. CIS is an organization that is deeply concerned about internet security and has released security strengthening guidelines for server operating systems known as CIS Benchmark. This research aims to enhance the security of the Ubuntu 20.04 operating system by implementing security hardening controls based on CIS Benchmark version 1.1.0, using the automation method through the Packer application. In addition to the hardening process, the automation method also generates a virtual machine image ready for system implementation, with a file size of 1.8 GB. Furthermore, to validate the security hardening, an audit is conducted using the CIS-CAT Lite application, which produces an audit compliance score of 218 controls or 99.54% out of the total 219 controls in CIS Benchmark version 1.1.0."
Depok: Fakultas Teknik Universitas Indonesia, 2023
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Tanenbaum, Andrew S., 1944-
New Jersey: Prentice-Hall, 2009
005.43 TAN m
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>