关注
Susila Windarta
Susila Windarta
Senior Lecturer, Politeknik Siber dan Sandi Negara
在 poltekssn.ac.id 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
S Windarta, S Suryadi, K Ramli, B Pranggono, TS Gunawan
Ieee Access 10, 82272-82294, 2022
232022
S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card
DSK Putra, MA Sadikin, S Windarta
2017 15th international conference on quality in research (QiR …, 2017
182017
A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128
N Hayati, K Ramli, S Windarta, M Suryanegara
IEEE Access 10, 18807-18819, 2022
112022
Statistical test on lightweight block cipher-based PRNG
YSS Risqi, S Windarta
2017 11th International Conference on Telecommunication Systems Services and …, 2017
82017
Fixed point attack in PGV-5 scheme using SIMON algorithm
YSS Risqi, S Yohanes, S Windarta
Procedia Computer Science 72, 292-299, 2015
42015
Distinguishing attack and second preimage attack on Mini-AES CBC-MAC
CR Wulamarisman, S Windarta
2014 International Conference of Advanced Informatics: Concept, Theory and …, 2014
42014
A novel session key update scheme for LoRaWAN
N Hayati, S Windarta, M Suryanegara, B Pranggono, K Ramli
IEEE Access 10, 89696-89713, 2022
32022
Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map
MAA Wasi, S Windarta
AIP Conference Proceedings 1707 (1), 2016
32016
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ...
IEEE Access, 2023
22023
A novel digital forensic framework for data breach investigation
AR Hakim, K Ramli, TS Gunawan, S Windarta
IEEE Access 11, 42644-42659, 2023
12023
Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery
S Windarta, K Ramli, D Sudiana
2020 1st International Conference on Information Technology, Advanced …, 2020
12020
Fungsi Hash Berbasis Teori Graf: Sebuah Survei
S Windarta
SESINDO 2013 2013, 2013
12013
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
D Saka Kurnia Putra, MA Sadikin, S Windarta
arXiv e-prints, arXiv: 1809.05238, 2018
2018
Parallel algorithm to find collision in Merkle-Damgard construction with fixed point for 2n/2/k work
S Risqi, S Windarta
2016 International Seminar on Application for Technology of Information and …, 2016
2016
Design key exchange protocol SOFU-11
YSS Risqi, S Windarta
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
2016
Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)
S Ariwibowo, S Windarta
AIP Conference Proceedings 1707 (1), 2016
2016
Parallel Algorithm to Find Collision in Merkle-Damgard Construction with Fixed Point for 2 n/2
S Risqi, S Windarta
系统目前无法执行此操作,请稍后再试。
文章 1–17