Urmăriți
Susila Windarta
Susila Windarta
Senior Lecturer, Politeknik Siber dan Sandi Negara
Adresă de e-mail confirmată pe poltekssn.ac.id
Titlu
Citat de
Citat de
Anul
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
S Windarta, S Suryadi, K Ramli, B Pranggono, TS Gunawan
Ieee Access 10, 82272-82294, 2022
332022
S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card
DSK Putra, MA Sadikin, S Windarta
2017 15th international conference on quality in research (QiR …, 2017
212017
A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128
N Hayati, K Ramli, S Windarta, M Suryanegara
IEEE Access 10, 18807-18819, 2022
162022
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ...
IEEE Access 11, 84074-84090, 2023
102023
A novel digital forensic framework for data breach investigation
AR Hakim, K Ramli, TS Gunawan, S Windarta
IEEE Access 11, 42644-42659, 2023
92023
Statistical test on lightweight block cipher-based PRNG
YSS Risqi, S Windarta
2017 11th International Conference on Telecommunication Systems Services and …, 2017
82017
A novel session key update scheme for LoRaWAN
N Hayati, S Windarta, M Suryanegara, B Pranggono, K Ramli
IEEE Access 10, 89696-89713, 2022
52022
Fixed point attack in PGV-5 scheme using SIMON algorithm
YSS Risqi, S Yohanes, S Windarta
Procedia Computer Science 72, 292-299, 2015
42015
Distinguishing attack and second preimage attack on Mini-AES CBC-MAC
CR Wulamarisman, S Windarta
2014 International Conference of Advanced Informatics: Concept, Theory and …, 2014
42014
Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map
MAA Wasi, S Windarta
AIP Conference Proceedings 1707 (1), 2016
32016
Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery
S Windarta, K Ramli, D Sudiana
2020 1st International Conference on Information Technology, Advanced …, 2020
12020
Fungsi Hash Berbasis Teori Graf: Sebuah Survei
S Windarta
SESINDO 2013 2013, 2013
12013
Practical Evaluation and Complexity Analysis of Forgery Attacks on the PAES-8 Authenticated Encryption Scheme
S Windarta, I Purbasari
Buletin Pos dan Telekomunikasi 22 (2), 41-60, 2024
2024
Evaluating Compliance of of the XYZ Ministry’s Android Messaging Applications with OWASP MASVS: A Comprehensive Case Study
GFM Karo-Karo, S Windarta, IR Hikmah
2024 IEEE 2nd International Conference on Electrical Engineering, Computer …, 2024
2024
Digital Artifact Analysis on Windows Subsystem for Android (WSA) based on ISO/IEC 27037: 2012 and ISO/IEC 27042: 2015
S Windarta, J Sidabutar, H Kabetta
2024 IEEE 2nd International Conference on Electrical Engineering, Computer …, 2024
2024
Strengthening IoT Security: An Analysis of the Security-related Properties of Power Function-based 5-bit S-box Cryptographic Design
AA Lestari, S Suryadi, K Ramli, S Windarta
2024 IEEE 10th Information Technology International Seminar (ITIS), 278-283, 2024
2024
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
D Saka Kurnia Putra, MA Sadikin, S Windarta
arXiv e-prints, arXiv: 1809.05238, 2018
2018
Parallel algorithm to find collision in Merkle-Damgard construction with fixed point for 2n/2/k work
S Risqi, S Windarta
2016 International Seminar on Application for Technology of Information and …, 2016
2016
Design key exchange protocol SOFU-11
YSS Risqi, S Windarta
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
2016
Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)
S Ariwibowo, S Windarta
AIP Conference Proceedings 1707 (1), 2016
2016
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20