Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application MA Sadikin, RW Wardhani 2016 International Seminar on Intelligent Technology and Its Applications …, 2016 | 23 | 2016 |
Depth-optimization of quantum cryptanalysis on binary elliptic curves DSC Putranto, RW Wardhani, HT Larasati, J Ji, H Kim IEEE Access, 2023 | 15* | 2023 |
Space and time-efficient quantum multiplier in post quantum cryptography era DSC Putranto, RW Wardhani, HT Larasati, H Kim IEEE Access 11, 21848-21862, 2023 | 9 | 2023 |
A high-performance ecc processor over curve448 based on a novel variant of the karatsuba formula for asymmetric digit multiplier AM Awaludin, J Park, RW Wardhani, H Kim IEEE Access 10, 67470-67481, 2022 | 9 | 2022 |
Reducing the depth of quantum flt-based inversion circuit HT Larasati, DSC Putranto, RW Wardhani, H Kim arXiv preprint arXiv:2204.08940, 2022 | 7* | 2022 |
Design of a snort-based IDS on the raspberry pi 3 model B+ applying TaZmen sniffer protocol and log alert integrity assurance with SHA-3 GV Yudha, RW Wardhani 2021 9th International Conference on Information and Communication …, 2021 | 7 | 2021 |
Design and Implementation of Smart Card based Secure Key Storage The Blockchain E-voting Application D Suyitno, BR Aladhirus, RW Wardhani 2020 1st International Conference on Information Technology, Advanced …, 2020 | 6 | 2020 |
Analysis of Secure Bit Rate for Quantum Key Distribution based on EDU-QCRY1 D Suyitno, HO Asmar, RW Wardhani, M Syahral, D Ogi, DSC Putranto 2019 International Seminar on Intelligent Technology and Its Applications …, 2019 | 6 | 2019 |
Implementation AES with digital signature for secure web-based electronic archive T Hermawan, RW Wardhani 2016 8th International Conference on Information Technology and Electrical …, 2016 | 6 | 2016 |
Block cipher and stream cipher algorithm performance comparison in a personal VPN gateway DD Ismoyo, RW Wardhani 2016 International Seminar on Application for Technology of Information and …, 2016 | 6 | 2016 |
Fast implementation of AES on Cortex-M3 for security information devices RW Wardhani, D Ogi, M Syahral, PD Septono 2017 15th International Conference on Quality in Research (QiR …, 2017 | 5 | 2017 |
Implementation of Secure Hash Algorithm–3 for Biometric Fingerprint Access Control Based on Arduino Mega 2560 I Alfiansyah, RW Wardhani 2018 International Conference on Applied Information Technology and …, 2018 | 3 | 2018 |
Design of Automated Polarization based on EDU-QCRY 1 C Donabela, MAU Nuha, RW Wardhani, M Syahral, D Ogi, DSC Putranto 2019 International Seminar on Research of Information Technology and …, 2019 | 2 | 2019 |
Least significant bit steganography method for the digital data protection in the barcode A Alma, RW Wardhani, S Muhasyah, M Delina AIP Conference Proceedings 2169 (1), 2019 | 2 | 2019 |
The study of blockchain technology in election system I Fauzi, RW Wardhani, S Muhasyah, M Delina AIP Conference Proceedings 2169 (1), 040010, 2019 | 2 | 2019 |
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ... IEEE Access, 2023 | 1 | 2023 |
Design Automation of Single Photon Counting Method for Quantum Random Number Generation D Novazrianto, AM Fajar, AK Dewi, M Yusuf, RW Wardhani, DSC Putranto 2021 9th International Conference on Information and Communication …, 2021 | 1 | 2021 |
Comparison of Trivium and Random Number Generator Arduino for Challenge Value in Color Combo Authentication Scheme on Arduino N Permatasari, M Fauzi, RW Wardhani 2018 International Conference on Applied Information Technology and …, 2018 | 1 | 2018 |
Towards Hybrid Classical Deep Learning-Quantum Methods for Steganalysis RW Wardhani, DSC Putranto, J Ji, H Kim IEEE Access, 2024 | | 2024 |
High-and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation RW Wardhani, DSC Putranto, H Kim IEEE Access, 2024 | | 2024 |