关注
Bety Hayat Susanti
Bety Hayat Susanti
Politeknik Siber dan Sandi Negara
在 poltekssn.ac.id 的电子邮件经过验证
标题
引用次数
引用次数
年份
Upper bounds for rainbow 2-connectivity of the Cartesian product of a path and a cycle
BH Susanti, ANM Salman, R Simanjuntak
Procedia Computer Science 74, 151-154, 2015
92015
The rainbow 2-connectivity of Cartesian pro-ducts of 2-connected graphs and paths
BH Susanti1ab, ANM Salmana, R Simanjuntaka
Electronic Journal of Graph Theory and Applications 8 (1), 145-156, 2020
62020
Robustness test of SIMON-32, SPECK-32, and SIMECK-32 algorithms using fixed-point attacks
BH Susanti, OJ Permana
Journal of Physics: Conference Series 1836 (1), 012006, 2021
52021
Rainbow 2-connectivity of edge-comb product of a cycle and a Hamiltonian graph
M Bača, ANM Salman, R Simanjuntak, BH Susanti
Proceedings-Mathematical Sciences 130, 1-12, 2020
52020
RM70: A Lightweight Hash Function
B Widhiara, Y Kurniawan, BH Susanti
42023
ENT Randomness Test on DM-PRESENT-80 and DM-PRESENT-128-based Pseudorandom Number Generator
BH Susanti, J Jimmy, MW Ardyani
2021 4th International Seminar on Research of Information Technology and …, 2021
42021
The rainbow connection number of some subdivided roof graphs
BH Susanti, ANM Salman, R Simanjuntak
AIP Conference Proceedings 1707 (1), 2016
42016
Collision attack against Tav-128 hash function
F Hariyanto, BH Susanti
Journal of Physics: Conference Series 893 (1), 012047, 2017
32017
Evaluation with NIST Statistical Test on Pseudorandom Number Generators based on DMP-80 and DMP-128
BH Susanti, J Jimmy, MW Ardyani
2022 5th International Seminar on Research of Information Technology and …, 2022
22022
Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential.
BH Susanti, MH Nor Ilahi, A Amiruddin, SS Carita
IAENG International Journal of Computer Science 48 (3), 2021
22021
A tutorial of boomerang attack on SMALLPRESENT-[4]
IW Hutahaean, AA Lestari, BH Susanti
Journal of Physics: Conference Series 1836 (1), 012029, 2021
22021
Forgery Attack on LightMAC Hash Function Scheme using SIMECK 32/64 Lightweight Block Cipher
TA Darumaya, BH Susanti
IOP Conference Series: Materials Science and Engineering 453 (1), 012014, 2018
22018
Implementation analysis of RC5 algorithm on Preneel-Govaerts-Vandewalle (PGV) hashing schemes using length extension attack
S Siswantyo, BH Susanti
AIP Conference Proceedings 1707 (1), 2016
22016
Konvergensi Produktivitas Tenaga Kerja Sektoral Antar Propinsi di Indonesia (1987-2003)
BH Susanti
Jurnal Kebijakan Ekonomi 2, 1-20, 2006
22006
The Design of a C1 Document Data Extraction Application Using a Tesseract-Optical Character Recognition Engine
IA Nugroho, BH Susanti, MW Ardyani, NP RA
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 8 (1), 42-53, 2024
12024
Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem
IH Masri, BH Susanti
2023 IEEE International Conference on Cryptography, Informatics, and …, 2023
12023
Fixed-point attack on Davies—Meyer hash function scheme based on SIMON, SPECK, and SIMECK algorithms
OJ Permana, BH Susanti, M Christine
AIP Conference Proceedings 2508 (1), 2023
12023
DOPE: MDC-2 Scheme Using PRESENT
A Lutfiani, BH Susanti
International Conference on Mathematics, Geometry, Statistics, and …, 2022
12022
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm
MN Salim, IW Hutahaean, BH Susanti
2020 International Conference on ICT for Smart Society (ICISS), 1-7, 2020
12020
Correcting block attack on the 32-bit reduced NEEVA
BH Susanti, MRR Bayhaqi, MW Ardyani
2020 1st International Conference on Information Technology, Advanced …, 2020
12020
系统目前无法执行此操作,请稍后再试。
文章 1–20