Upper bounds for rainbow 2-connectivity of the Cartesian product of a path and a cycle BH Susanti, ANM Salman, R Simanjuntak Procedia Computer Science 74, 151-154, 2015 | 9 | 2015 |
The rainbow 2-connectivity of Cartesian pro-ducts of 2-connected graphs and paths BH Susanti1ab, ANM Salmana, R Simanjuntaka Electronic Journal of Graph Theory and Applications 8 (1), 145-156, 2020 | 6 | 2020 |
Robustness test of SIMON-32, SPECK-32, and SIMECK-32 algorithms using fixed-point attacks BH Susanti, OJ Permana Journal of Physics: Conference Series 1836 (1), 012006, 2021 | 5 | 2021 |
Rainbow 2-connectivity of edge-comb product of a cycle and a Hamiltonian graph M Bača, ANM Salman, R Simanjuntak, BH Susanti Proceedings-Mathematical Sciences 130, 1-12, 2020 | 5 | 2020 |
RM70: A Lightweight Hash Function B Widhiara, Y Kurniawan, BH Susanti | 4 | 2023 |
ENT Randomness Test on DM-PRESENT-80 and DM-PRESENT-128-based Pseudorandom Number Generator BH Susanti, J Jimmy, MW Ardyani 2021 4th International Seminar on Research of Information Technology and …, 2021 | 4 | 2021 |
The rainbow connection number of some subdivided roof graphs BH Susanti, ANM Salman, R Simanjuntak AIP Conference Proceedings 1707 (1), 2016 | 4 | 2016 |
Collision attack against Tav-128 hash function F Hariyanto, BH Susanti Journal of Physics: Conference Series 893 (1), 012047, 2017 | 3 | 2017 |
Evaluation with NIST Statistical Test on Pseudorandom Number Generators based on DMP-80 and DMP-128 BH Susanti, J Jimmy, MW Ardyani 2022 5th International Seminar on Research of Information Technology and …, 2022 | 2 | 2022 |
Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential. BH Susanti, MH Nor Ilahi, A Amiruddin, SS Carita IAENG International Journal of Computer Science 48 (3), 2021 | 2 | 2021 |
A tutorial of boomerang attack on SMALLPRESENT-[4] IW Hutahaean, AA Lestari, BH Susanti Journal of Physics: Conference Series 1836 (1), 012029, 2021 | 2 | 2021 |
Forgery Attack on LightMAC Hash Function Scheme using SIMECK 32/64 Lightweight Block Cipher TA Darumaya, BH Susanti IOP Conference Series: Materials Science and Engineering 453 (1), 012014, 2018 | 2 | 2018 |
Implementation analysis of RC5 algorithm on Preneel-Govaerts-Vandewalle (PGV) hashing schemes using length extension attack S Siswantyo, BH Susanti AIP Conference Proceedings 1707 (1), 2016 | 2 | 2016 |
Konvergensi Produktivitas Tenaga Kerja Sektoral Antar Propinsi di Indonesia (1987-2003) BH Susanti Jurnal Kebijakan Ekonomi 2, 1-20, 2006 | 2 | 2006 |
The Design of a C1 Document Data Extraction Application Using a Tesseract-Optical Character Recognition Engine IA Nugroho, BH Susanti, MW Ardyani, NP RA Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 8 (1), 42-53, 2024 | 1 | 2024 |
Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem IH Masri, BH Susanti 2023 IEEE International Conference on Cryptography, Informatics, and …, 2023 | 1 | 2023 |
Fixed-point attack on Davies—Meyer hash function scheme based on SIMON, SPECK, and SIMECK algorithms OJ Permana, BH Susanti, M Christine AIP Conference Proceedings 2508 (1), 2023 | 1 | 2023 |
DOPE: MDC-2 Scheme Using PRESENT A Lutfiani, BH Susanti International Conference on Mathematics, Geometry, Statistics, and …, 2022 | 1 | 2022 |
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm MN Salim, IW Hutahaean, BH Susanti 2020 International Conference on ICT for Smart Society (ICISS), 1-7, 2020 | 1 | 2020 |
Correcting block attack on the 32-bit reduced NEEVA BH Susanti, MRR Bayhaqi, MW Ardyani 2020 1st International Conference on Information Technology, Advanced …, 2020 | 1 | 2020 |