Lightweight cryptographic hash functions: Design trends, comparative study, and future directions S Windarta, S Suryadi, K Ramli, B Pranggono, TS Gunawan Ieee Access 10, 82272-82294, 2022 | 23 | 2022 |
S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card DSK Putra, MA Sadikin, S Windarta 2017 15th international conference on quality in research (QiR …, 2017 | 18 | 2017 |
A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128 N Hayati, K Ramli, S Windarta, M Suryanegara IEEE Access 10, 18807-18819, 2022 | 11 | 2022 |
Statistical test on lightweight block cipher-based PRNG YSS Risqi, S Windarta 2017 11th International Conference on Telecommunication Systems Services and …, 2017 | 8 | 2017 |
Fixed point attack in PGV-5 scheme using SIMON algorithm YSS Risqi, S Yohanes, S Windarta Procedia Computer Science 72, 292-299, 2015 | 4 | 2015 |
Distinguishing attack and second preimage attack on Mini-AES CBC-MAC CR Wulamarisman, S Windarta 2014 International Conference of Advanced Informatics: Concept, Theory and …, 2014 | 4 | 2014 |
A novel session key update scheme for LoRaWAN N Hayati, S Windarta, M Suryanegara, B Pranggono, K Ramli IEEE Access 10, 89696-89713, 2022 | 3 | 2022 |
Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map MAA Wasi, S Windarta AIP Conference Proceedings 1707 (1), 2016 | 3 | 2016 |
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ... IEEE Access, 2023 | 2 | 2023 |
A novel digital forensic framework for data breach investigation AR Hakim, K Ramli, TS Gunawan, S Windarta IEEE Access 11, 42644-42659, 2023 | 1 | 2023 |
Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery S Windarta, K Ramli, D Sudiana 2020 1st International Conference on Information Technology, Advanced …, 2020 | 1 | 2020 |
Fungsi Hash Berbasis Teori Graf: Sebuah Survei S Windarta SESINDO 2013 2013, 2013 | 1 | 2013 |
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard D Saka Kurnia Putra, MA Sadikin, S Windarta arXiv e-prints, arXiv: 1809.05238, 2018 | | 2018 |
Parallel algorithm to find collision in Merkle-Damgard construction with fixed point for 2n/2/k work S Risqi, S Windarta 2016 International Seminar on Application for Technology of Information and …, 2016 | | 2016 |
Design key exchange protocol SOFU-11 YSS Risqi, S Windarta 2016 International Seminar on Intelligent Technology and Its Applications …, 2016 | | 2016 |
Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC) S Ariwibowo, S Windarta AIP Conference Proceedings 1707 (1), 2016 | | 2016 |
Parallel Algorithm to Find Collision in Merkle-Damgard Construction with Fixed Point for 2 n/2 S Risqi, S Windarta | | |