• About

Rizal Broer Bahaweres

  • Questioner Peserta Logo dan Merek

    July 17th, 2019

    Questioner

    1. Nama
    2. jenis usaha
    3. Tempat, tgl berdirinya usaha ?
    3. Apakah sudah ada logo ?
    gambar ? (Y/T)
    Tulisan/ Huruf/ Kata ? (Y/T)
    4. Sudah memasukan/mendaftarkan form logo di DPE, Dep.KumHam ?
    4a. Sudah berapa lama ?
    4b. respon balik/ feed Back ?

    5 Apakah pernah mempelajari Teknis, Desain Membuat logo dan merek ?
    5a. Konsep Merek ? (Y/T)
    5b. Konsep Logo ? (Y/T)
    5c. Tools Desain
    Adobe illustrator, dll.
    6. Apakah pernah melakukan/memproses logo dan Merek, ?
    6a. pernah ke web Dep.KumHam/Deperindag ?
    6b. pernah mengisi dan mendaftarkan ?
    6c. pernah punya logo, Merek ?

     

    http://www.dgip.go.id/formulir-terkait-permohonan-merek

     

     

  • Protected: UAS Cryptography

    This content is password-protected. To view it, please enter the password below.

  • UAS OS

    July 8th, 2019

    Hari ini kita mulai UAS jam 8.00 dikelas biasa; Peserta UAS wajib hadir ontime

    Dikerjakan dikertas, Lembar Ujian.
    Boleh buka buku, internet dll, DILARANG MECONTEK TEMAN . Yang melangar akan diberi BONUS E

    Soal type A. untuk NIM Ganjil
    Soal Type B untuk NIM Genap

    https://drive.google.com/drive/folders/1rjlQ-uY03C9f3QllK5VYFsKim7LGkAGp?usp=sharing

     

  • Tutorial Matematica Wolfram

    June 20th, 2019

    Tutorial Wolfram Matematica

  • ECC part 1

    May 9th, 2019

    Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security.[1]

    Elliptic curves are applicable for key agreement, digital signatures, pseudo-random generators and other tasks. Indirectly, they can be used for encryption by combining the key agreement with a symmetric encryption scheme. They are also used in several integer factorization algorithms based on elliptic curves that have applications in cryptography, such as Lenstra elliptic-curve factorization.

     

    Theory

    For current cryptographic purposes, an elliptic curve is a plane curve over a finite field (rather than the real numbers) which consists of the points satisfying the equation

    {\displaystyle y^{2}=x^{3}+ax+b,\,}

    along with a distinguished point at infinity, denoted ∞. (The coordinates here are to be chosen from a fixed finite field of characteristic not equal to 2 or 3, or the curve equation will be somewhat more complicated.)

    This set together with the group operation of elliptic curves is an abelian group, with the point at infinity as an identity element. The structure of the group is inherited from the divisor group of the underlying algebraic variety.

    {\displaystyle \mathrm {Div} ^{0}(E)\to \mathrm {Pic} ^{0}(E)\simeq E,\,}

     

    Cryptographic schemes

    Several discrete logarithm-based protocols have been adapted to elliptic curves, replacing the group

    {\displaystyle (\mathbb {Z} _{p})^{\times }}

    with an elliptic curve:

    • The Elliptic Curve Diffie–Hellman (ECDH) key agreement scheme is based on the Diffie–Hellman scheme,
    • The Elliptic Curve Integrated Encryption Scheme (ECIES), also known as Elliptic Curve Augmented Encryption Scheme or simply the Elliptic Curve Encryption Scheme,
    • The Elliptic Curve Digital Signature Algorithm (ECDSA) is based on the Digital Signature Algorithm,
    • The deformation scheme using Harrison’s p-adic Manhattan metric,
    • The Edwards-curve Digital Signature Algorithm (EdDSA) is based on Schnorr signature and uses twisted Edwards curves,
    • The ECMQV key agreement scheme is based on the MQV key agreement scheme,
    • The ECQV implicit certificate scheme.

    At the RSA Conference 2005, the National Security Agency (NSA) announced Suite B which exclusively uses ECC for digital signature generation and key exchange. The suite is intended to protect both classified and unclassified national security systems and information.[8]

    Recently, a large number of cryptographic primitives based on bilinear mappings on various elliptic curve groups, such as the Weil and Tate pairings, have been introduced. Schemes based on these primitives provide efficient identity-based encryption as well as pairing-based signatures, signcryption, key agreement, and proxy re-encryption.

     

    Reference :

    https://en.wikipedia.org/wiki/Elliptic-curve_cryptography

     

    Reading :

    An Introduction to the Theory of Elliptic Curves Joseph H. Silverman Brown University and NTRU Cryptosystems, Inc.

    https://www.math.brown.edu/~jhs/Presentations/WyomingEllipticCurve.pdf

     

    Craig Costello A gentle introduction to elliptic curve cryptography. Summer School on Real-World Crypto and Privacy

    https://summerschool-croatia.cs.ru.nl/2017/slides/A%20gentle%20introduction%20to%20elliptic%20curve%20cryptography.pdf

    bitcoinbook/ch04.asciidoc

    https://github.com/bitcoinbook/bitcoinbook/blob/develop/ch04.asciidoc

     

    Guide to Elliptic Curve Cryptography BOOK

    http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.394.3037&rep=rep1&type=pdf

     

    You tube Reference :

     

    https://www.youtube.com/results?search_query=Elliptic+Curve+Cryptography

    Elliptic Curve Cryptography Overview

    https://www.youtube.com/watch?v=dCvB-mhkT0w

     

    Elliptic Curve Diffie Hellman

    https://www.youtube.com/watch?v=F3zzNa42-tQ

     

    Elliptic Curve Point Addition

    https://www.youtube.com/watch?v=XmygBPb7DPM

     

    Elliptic curves

    Explore the history of counting points on elliptic curves, from ancient Greece to present day. Inaugural lecture of Professor Toby Gee.

    https://www.youtube.com/watch?v=6eZQu120A80

     

    Martijn Grooten – Elliptic Curve Cryptography for those who are afraid of maths

    https://www.youtube.com/watch?v=yBr3Q6xiTw4&t=119s

     

    Elliptic Curve Cryptography, A very brief and superficial introduction

    https://www.youtube.com/watch?v=oPJrWYmqGRs

     

    ECC intro Broer

  • Number Theory

    April 4th, 2019

    Intro Number theory – Broer

    // ===== pdf
    cong-broer.pdf
    ent (1)-Elementary Number Theory.pdf

    // ===== mp4
    Congruence mod n_ Video.mp4
    Inverses mod n_ Video.mp4
    Introduction to Number Theory.mp4
    Probability and Information Theory.mp4

    link:
    http://mathworld.wolfram.com/Congruence.html

  • Intro Python, Jupiter Notebook for Dummies

    March 27th, 2019

    Material 0 Introduction IPyhton

    Material  1 – Python101-Broer

    Material MP4

    1. Welcome
    2. Your First Program
    3. Type
    4. String Operation
    5. Expression and Variable

     

    Reference

    1. Python Data Science
    2. Python the hard Way
    3. Python Crash Course
    4. Head First Python
    5. Learning Python
    6. https://docs.python-guide.org/intro/learning/
  • Protected: Uas Software TESTING UINJKT

    This content is password-protected. To view it, please enter the password below.

  • Soal UAS ComputerForensics2Jan2019

    January 2nd, 2019

    Soal UAS UINJKT bisa dilihat dan diambil pada link:

    https://www.dropbox.com/sh/07uowzt738vgnb7/AAAxaT3xcCe-UNrP-zmjqqtGa?dl=0

     

  • Happy new Year 2019

    December 31st, 2018

    Happy new Year 2019

    https://uinjkt.academia.edu/rizalbroer

     

←Previous Page
1 2 3 4
Next Page→

Create a free website or blog at WordPress.com.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Rizal Broer Bahaweres
    • Already have a WordPress.com account? Log in now.
    • Rizal Broer Bahaweres
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar