Follow
Bety Hayat Susanti
Bety Hayat Susanti
Politeknik Siber dan Sandi Negara
Verified email at poltekssn.ac.id
Title
Cited by
Cited by
Year
Upper bounds for rainbow 2-connectivity of the Cartesian product of a path and a cycle
BH Susanti, ANM Salman, R Simanjuntak
Procedia Computer Science 74, 151-154, 2015
92015
The rainbow 2-connectivity of Cartesian pro-ducts of 2-connected graphs and paths
BH Susanti1ab, ANM Salmana, R Simanjuntaka
Electronic Journal of Graph Theory and Applications 8 (1), 145-156, 2020
62020
Robustness test of SIMON-32, SPECK-32, and SIMECK-32 algorithms using fixed-point attacks
BH Susanti, OJ Permana
Journal of Physics: Conference Series 1836 (1), 012006, 2021
42021
Rainbow 2-connectivity of edge-comb product of a cycle and a Hamiltonian graph
M Bača, ANM Salman, R Simanjuntak, BH Susanti
Proceedings-Mathematical Sciences 130, 1-12, 2020
42020
ENT Randomness Test on DM-PRESENT-80 and DM-PRESENT-128-based Pseudorandom Number Generator
BH Susanti, J Jimmy, MW Ardyani
2021 4th International Seminar on Research of Information Technology and …, 2021
32021
Collision attack against Tav-128 hash function
F Hariyanto, BH Susanti
Journal of Physics: Conference Series 893 (1), 012047, 2017
32017
The rainbow connection number of some subdivided roof graphs
BH Susanti, ANM Salman, R Simanjuntak
AIP Conference Proceedings 1707 (1), 2016
32016
RM70: A Lightweight Hash Function
B Widhiara, Y Kurniawan, BH Susanti
22023
Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential.
BH Susanti, MH Nor Ilahi, A Amiruddin, SS Carita
IAENG International Journal of Computer Science 48 (3), 2021
22021
A tutorial of boomerang attack on SMALLPRESENT-[4]
IW Hutahaean, AA Lestari, BH Susanti
Journal of Physics: Conference Series 1836 (1), 012029, 2021
22021
Forgery Attack on LightMAC Hash Function Scheme using SIMECK 32/64 Lightweight Block Cipher
TA Darumaya, BH Susanti
IOP Conference Series: Materials Science and Engineering 453 (1), 012014, 2018
22018
Implementation analysis of RC5 algorithm on Preneel-Govaerts-Vandewalle (PGV) hashing schemes using length extension attack
S Siswantyo, BH Susanti
AIP Conference Proceedings 1707 (1), 2016
22016
Konvergensi Produktivitas Tenaga Kerja Sektoral Antar Propinsi di Indonesia (1987-2003)
BH Susanti
Jurnal Kebijakan Ekonomi 2, 1-20, 2006
22006
Cryptanalysis on Polynomial Congruence-Based Public Key with Chinese Remainder Theorem
IH Masri, BH Susanti
2023 IEEE International Conference on Cryptography, Informatics, and …, 2023
12023
Fixed-point attack on Davies—Meyer hash function scheme based on SIMON, SPECK, and SIMECK algorithms
OJ Permana, BH Susanti, M Christine
AIP Conference Proceedings 2508 (1), 2023
12023
Evaluation with NIST Statistical Test on Pseudorandom Number Generators based on DMP-80 and DMP-128
BH Susanti, J Jimmy, MW Ardyani
2022 5th International Seminar on Research of Information Technology and …, 2022
12022
DOPE: MDC-2 Scheme Using PRESENT
A Lutfiani, BH Susanti
International Conference on Mathematics, Geometry, Statistics, and …, 2022
12022
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm
MN Salim, IW Hutahaean, BH Susanti
2020 International Conference on ICT for Smart Society (ICISS), 1-7, 2020
12020
Correcting block attack on the 32-bit reduced NEEVA
BH Susanti, MRR Bayhaqi, MW Ardyani
2020 1st International Conference on Information Technology, Advanced …, 2020
12020
Correcting Block Attack on Reduced NEEVA
MRR Bayhaqi, BH Susanti, M Syahral
2019 16th International Conference on Quality in Research (QIR …, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20