Follow
Susila Windarta
Susila Windarta
Senior Lecturer, Politeknik Siber dan Sandi Negara
Verified email at poltekssn.ac.id
Title
Cited by
Cited by
Year
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
S Windarta, S Suryadi, K Ramli, B Pranggono, TS Gunawan
IEEE Access 10, 82272-82294, 2022
212022
S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card
DSK Putra, MA Sadikin, S Windarta
2017 15th international conference on quality in research (QiR …, 2017
162017
A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128
N Hayati, K Ramli, S Windarta, M Suryanegara
IEEE Access 10, 18807-18819, 2022
92022
Statistical test on lightweight block cipher-based PRNG
YSS Risqi, S Windarta
2017 11th International Conference on Telecommunication Systems Services and …, 2017
82017
Fixed point attack in PGV-5 scheme using SIMON algorithm
YSS Risqi, S Yohanes, S Windarta
Procedia Computer Science 72, 292-299, 2015
42015
Distinguishing attack and second preimage attack on Mini-AES CBC-MAC
CR Wulamarisman, S Windarta
2014 International Conference of Advanced Informatics: Concept, Theory and …, 2014
42014
Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map
MAA Wasi, S Windarta
AIP Conference Proceedings 1707 (1), 2016
32016
A novel session key update scheme for LoRaWAN
N Hayati, S Windarta, M Suryanegara, B Pranggono, K Ramli
IEEE Access 10, 89696-89713, 2022
22022
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ...
IEEE Access, 2023
12023
A novel digital forensic framework for data breach investigation
AR Hakim, K Ramli, TS Gunawan, S Windarta
IEEE Access, 2023
12023
Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery
S Windarta, K Ramli, D Sudiana
2020 1st International Conference on Information Technology, Advanced …, 2020
12020
Fungsi Hash Berbasis Teori Graf: Sebuah Survei
S Windarta
SESINDO 2013 2013, 2013
12013
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
D Saka Kurnia Putra, MA Sadikin, S Windarta
arXiv e-prints, arXiv: 1809.05238, 2018
2018
Parallel algorithm to find collision in Merkle-Damgard construction with fixed point for 2n/2/k work
S Risqi, S Windarta
2016 International Seminar on Application for Technology of Information and …, 2016
2016
Design key exchange protocol SOFU-11
YSS Risqi, S Windarta
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
2016
Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)
S Ariwibowo, S Windarta
AIP Conference Proceedings 1707 (1), 2016
2016
Parallel Algorithm to Find Collision in Merkle-Damgard Construction with Fixed Point for 2 n/2
S Risqi, S Windarta
The system can't perform the operation now. Try again later.
Articles 1–17