S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card DSK Putra, MA Sadikin, S Windarta 2017 15th international conference on quality in research (QiR …, 2017 | 16 | 2017 |
Statistical test on lightweight block cipher-based PRNG YSS Risqi, S Windarta 2017 11th International Conference on Telecommunication Systems Services and …, 2017 | 8 | 2017 |
A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128 N Hayati, K Ramli, S Windarta, M Suryanegara IEEE Access 10, 18807-18819, 2022 | 4 | 2022 |
Distinguishing attack and second preimage attack on Mini-AES CBC-MAC CR Wulamarisman, S Windarta 2014 International Conference of Advanced Informatics: Concept, Theory and …, 2014 | 4 | 2014 |
Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map MAA Wasi, S Windarta AIP Conference Proceedings 1707 (1), 050018, 2016 | 3 | 2016 |
Fixed point attack in PGV-5 scheme using SIMON algorithm YSS Risqi, S Yohanes, S Windarta Procedia Computer Science 72, 292-299, 2015 | 3 | 2015 |
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions S Windarta, S Suryadi, K Ramli, B Pranggono, TS Gunawan IEEE Access 10, 82272-82294, 2022 | 2 | 2022 |
Fungsi Hash Berbasis Teori Graf: Sebuah Survei S Windarta SESINDO 2013 2013, 2013 | 1 | 2013 |
A Novel Digital Forensic Framework for Data Breach Investigation AR Hakim, K Ramli, TS Gunawan, S Windarta IEEE Access, 2023 | | 2023 |
A Novel Session Key Update Scheme for LoRaWAN N Hayati, S Windarta, M Suryanegara, B Pranggono, K Ramli IEEE Access 10, 89696-89713, 2022 | | 2022 |
Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery S Windarta, K Ramli, D Sudiana 2020 1st International Conference on Information Technology, Advanced …, 2020 | | 2020 |
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard D Saka Kurnia Putra, MA Sadikin, S Windarta arXiv e-prints, arXiv: 1809.05238, 2018 | | 2018 |
Parallel algorithm to find collision in Merkle-Damgard construction with fixed point for 2n/2/k work S Risqi, S Windarta 2016 International Seminar on Application for Technology of Information and …, 2016 | | 2016 |
Design key exchange protocol SOFU-11 YSS Risqi, S Windarta 2016 International Seminar on Intelligent Technology and Its Applications …, 2016 | | 2016 |
Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC) S Ariwibowo, S Windarta AIP Conference Proceedings 1707 (1), 050002, 2016 | | 2016 |
Parallel Algorithm to Find Collision in Merkle-Damgard Construction with Fixed Point for 2 n/2 S Risqi, S Windarta | | |