Follow
Rini Wisnu Wardhani
Rini Wisnu Wardhani
Pusan National University, National Cyber and Crypto Agency.
Verified email at pusan.ac.kr
Title
Cited by
Cited by
Year
Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application
MA Sadikin, RW Wardhani
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
232016
Depth-optimization of quantum cryptanalysis on binary elliptic curves
DSC Putranto, RW Wardhani, HT Larasati, J Ji, H Kim
IEEE Access, 2023
15*2023
Space and time-efficient quantum multiplier in post quantum cryptography era
DSC Putranto, RW Wardhani, HT Larasati, H Kim
IEEE Access 11, 21848-21862, 2023
92023
A high-performance ecc processor over curve448 based on a novel variant of the karatsuba formula for asymmetric digit multiplier
AM Awaludin, J Park, RW Wardhani, H Kim
IEEE Access 10, 67470-67481, 2022
92022
Reducing the depth of quantum flt-based inversion circuit
HT Larasati, DSC Putranto, RW Wardhani, H Kim
arXiv preprint arXiv:2204.08940, 2022
7*2022
Design of a snort-based IDS on the raspberry pi 3 model B+ applying TaZmen sniffer protocol and log alert integrity assurance with SHA-3
GV Yudha, RW Wardhani
2021 9th International Conference on Information and Communication …, 2021
72021
Design and Implementation of Smart Card based Secure Key Storage The Blockchain E-voting Application
D Suyitno, BR Aladhirus, RW Wardhani
2020 1st International Conference on Information Technology, Advanced …, 2020
62020
Analysis of Secure Bit Rate for Quantum Key Distribution based on EDU-QCRY1
D Suyitno, HO Asmar, RW Wardhani, M Syahral, D Ogi, DSC Putranto
2019 International Seminar on Intelligent Technology and Its Applications …, 2019
62019
Implementation AES with digital signature for secure web-based electronic archive
T Hermawan, RW Wardhani
2016 8th International Conference on Information Technology and Electrical …, 2016
62016
Block cipher and stream cipher algorithm performance comparison in a personal VPN gateway
DD Ismoyo, RW Wardhani
2016 International Seminar on Application for Technology of Information and …, 2016
62016
Fast implementation of AES on Cortex-M3 for security information devices
RW Wardhani, D Ogi, M Syahral, PD Septono
2017 15th International Conference on Quality in Research (QiR …, 2017
52017
Implementation of Secure Hash Algorithm–3 for Biometric Fingerprint Access Control Based on Arduino Mega 2560
I Alfiansyah, RW Wardhani
2018 International Conference on Applied Information Technology and …, 2018
32018
Design of Automated Polarization based on EDU-QCRY 1
C Donabela, MAU Nuha, RW Wardhani, M Syahral, D Ogi, DSC Putranto
2019 International Seminar on Research of Information Technology and …, 2019
22019
Least significant bit steganography method for the digital data protection in the barcode
A Alma, RW Wardhani, S Muhasyah, M Delina
AIP Conference Proceedings 2169 (1), 2019
22019
The study of blockchain technology in election system
I Fauzi, RW Wardhani, S Muhasyah, M Delina
AIP Conference Proceedings 2169 (1), 040010, 2019
22019
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ...
IEEE Access, 2023
12023
Design Automation of Single Photon Counting Method for Quantum Random Number Generation
D Novazrianto, AM Fajar, AK Dewi, M Yusuf, RW Wardhani, DSC Putranto
2021 9th International Conference on Information and Communication …, 2021
12021
Comparison of Trivium and Random Number Generator Arduino for Challenge Value in Color Combo Authentication Scheme on Arduino
N Permatasari, M Fauzi, RW Wardhani
2018 International Conference on Applied Information Technology and …, 2018
12018
Towards Hybrid Classical Deep Learning-Quantum Methods for Steganalysis
RW Wardhani, DSC Putranto, J Ji, H Kim
IEEE Access, 2024
2024
High-and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation
RW Wardhani, DSC Putranto, H Kim
IEEE Access, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20