Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7 dokumen yang sesuai dengan query
cover
Mahyudin AR
Depok: Universitas Indonesia, 1991
S38110
UI - Skripsi Membership  Universitas Indonesia Library
cover
"Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board."
Berlin: Springer-Verlag, 2012
e20409533
eBooks  Universitas Indonesia Library
cover
Schweitzer, James A.
Boston: Butterworth, 1982
658.478 SCH m
Buku Teks SO  Universitas Indonesia Library
cover
Napitupulu, Willy
"Sistem operasi Windows merupakan sistem operasi yang umum digunakan oleh banyak orang. Universal Serial Bus (USB) merupakan salah satu mekanisme yang digunakan oleh banyak orang dengan fungsionalitas plug and play yang praktis, menjadikan transfer data yang cepat dan mudah dibandingkan dengan perangkat keras lainnya. Pada penggunaannya, Windows memiliki kelemahan yaitu dengan mudahnya pengguna mengalami eksploitasi terhadap komputer/laptop. Ada metode bernama yang memungkinkan untuk seseorang melakukan penanaman backdoor reverse shell dan eksploitasi file hanya dengan menghubungkan USB ke komputer target tanpa diketahui. Pada penelitian ini bertujuan untuk mengimplementasikan dan menganalisis dampak dari penyerangan yang dilakukan BadUSB. Penelitian dilakukan untuk melihat apakah penanaman backdoor reverse shell dan eksploitasi file pada komputer target dengan menggunakan BadUSB dapat dilakukan atau tidak. Hasil yang didapatkan adalah pengujian backdoor reverse shell menggunakan yang dilakukan pada sistem operasi Windows berhasil dilakukan

The Windows operating system is an operating system that is commonly used by many people. Universal Serial Bus (USB) is a mechanism used by many people with practical plug and play functionality, making data transfer fast and easy compared to other hardware. In its use, Windows has a weakness, namely that it is easy for users to experience exploitation of computers/laptops. There is a method called that makes it possible for someone to plant a reverse shell backdoor and exploit files just by connecting a USB to the target computer without being noticed. This research aims to implement and analyze the impact of attacks carried out by BadUSB . Research was carried out to see whether planting a reverse shell backdoor and exploiting files on the target computer using BadUSB could be done or not. The results obtained were that the backdoor reverse shell test using which was carried out on the Windows operating system was successfully carried out."
Depok: Fakultas Teknik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Bathurst, Robert
Boston : Syngress , 2013
005.268 BAT h
Buku Teks SO  Universitas Indonesia Library
cover
Katz, Jonathan, 1974-
"ryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/​ECDSA and DHIES/​ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study."
Boca Raton: CRC Press, 2015
005.82 KAT i
Buku Teks SO  Universitas Indonesia Library
cover
Mochamad Fahmi Fajrin
"Plagiarisme merupakan tindakan mengakui hasil karya orang lain sebagai hasil karya pribadi tanpa izin pemilik asli karya tersebut. Tindakan plagiarisme dalam bentuk dokumen sudah sangat banyak terjadi saat era digital seperti ini. Pada skripsi ini dibuat sistem pendeteksi plagiarisme otomatis pada karya tulis digital dwibahasa (Indonesia - Inggris) dengan bahasa Indonesia digunakan sebagai karya tulis yang akan diuji dan bahasa Inggris sebagai karya tulis referensinya. Sistem pendeteksi plagiarisme terdapat dua bagian penting, yaitu akurasi dan kecepatan yang dihasilkan oleh sistem.
Pada skripsi ini dilakukan pengembangan terhadap sistem pendeteksi plagiarisme dengan menambahkan penerjemah Microsoft Translator API dan menerapkan similar word. Penerapan penerjemah Microsoft Translator API dapat meningkatkan akurasi yang cukup signifikan yaitu sebesar 14,93 % dibandingkan penerjemah Googletrans API dan penerapan similar word dapat meningkatkan akurasi sistem dari 0,24% hingga 15,37%. Parallel processing diterapkan untuk mengatasi permasalahan waktu eksekusi yang lama ketika jumlah dokumen referensi yang digunakan banyak. Hasil pengujian dengan menerapkan parallel processing dapat meningkatkan kecepatan 1,06 hingga 6,71 kali lebih cepat dari program yang berjalan secara serial.

Plagiarism is the act of acknowledging the work of others personal work without their permissions. The prevalence of plagiarism is high in this digital era. In this thesis, an automatic plagiarism detection system on bilingual digital paper (Indonesian-English) is created with Indonesian paper as the tested paper and English paper as the reference paper. The plagiarism detection system has two important parts, namely the accuracy and speed produced by the system.
In this thesis, a plagiarism detection system is developed by adding a Microsoft Translator API translator and applying a similar word. The application of the Microsoft Translator API translator can increase the accuracy of the significant amount of 14.93% compared to the Googletrans API translator and the application of similar word can increase system accuracy from 0.24% to 15.37%. Parallel processing will be applied to overcome the problems of a long execution time when the number of reference documents that are used a lot. The test results by applying parallel processing can increase the speed of 1.06 to 6.71 times faster than programs running in serial.
"
Depok: Fakultas Teknik Universitas Indonesia, 2019
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library