Follow
Sarwono Sutikno
Sarwono Sutikno
School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, INDONESIA
Verified email at stei.itb.ac.id - Homepage
Title
Cited by
Cited by
Year
Design and implementation of arithmetic processor F/sub 2//sup 155/for elliptic curve cryptosystems
S Sutikno, R Effendi, A Surya
IEEE. APCCAS 1998. 1998 IEEE Asia-Pacific Conference on Circuits and Systems …, 1998
631998
An implementation of ElGamal elliptic curves cryptosystems
S Sutikno, A Surya, R Effendi
IEEE. APCCAS 1998. 1998 IEEE Asia-Pacific Conference on Circuits and Systems …, 1998
381998
Issues in elliptic curve cryptography implementation
MW Paryasto, S Sutikno, A Sasongko
Internetworking Indonesia Journal 1 (1), 29-33, 2009
312009
The measurement design of information security management system
M Nancylia, EK Mudjtabar, S Sutikno, Y Rosmansyah
2014 8th International Conference on Telecommunication Systems Services and …, 2014
232014
Model design of information security governance assessment with collaborative integration of COBIT 5 and ITIL (case study: INTRAC)
P Kusumah, S Sutikno, Y Rosmansyah
2014 International Conference on ICT For Smart Society (ICISS), 1-6, 2014
212014
Design of e-government security governance system using cobit 2019:(trial implementation in badan xyz)
VS Kasma, S Sutikno, K Surendro
2019 International Conference on ICT for Smart Society (ICISS) 7, 1-6, 2019
172019
Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3
SD Putra, M Yudhiprawira, S Sutikno, Y Kurniawan, AS Ahmad
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (3 …, 2019
172019
An architecture of F (2/sup 2N/) multiplier for elliptic curves cryptosystem
S Sutikno, A Surya
2000 IEEE International Symposium on Circuits and Systems (ISCAS) 1, 279-282, 2000
17*2000
DPA-countermeasure with knowledge growing system
SD Putra, AS Ahmad, S Sutikno
2016 International Symposium on Electronics and Smart Devices (ISESD), 16-20, 2016
162016
Secure spread spectrum watermarking algorithm based on chaotic map for still images
R Munir, B Riyanto, S Sutikno, W P Agung
Proceedings of the International Conference on Electrical Engineering and …, 2007
142007
Revealing AES Encryption Device Key on 328P Microcontrollers with Differential Power Analysis.
SD Putra, AS Ahmad, S Sutikno, Y Kurniawan, AD Wahyudi Sumari
International Journal of Electrical & Computer Engineering (2088-8708) 8 (6), 2018
132018
Power analysis attack on implementation of DES
SD Putra, AS Ahmad, S Sutikno
2016 International Conference on Information Technology Systems and …, 2016
132016
The new embedded system design methodology for improving design process performance
M Abdurohman, S Sutikno, A Sasongko
arXiv preprint arXiv:1005.0931, 2010
122010
Measuring effectiveness of control of information security management system based on SNI ISO/IEC 27004: 2013 standard
AP Aldya, S Sutikno, Y Rosmansyah
IOP Conference Series: Materials Science and Engineering 550 (1), 012020, 2019
112019
Architecture for the secret-key BC3 cryptography algorithm
A Sasongko, H Hidayat, Y Kurniawan, S Sutikno
ITB J. Inf. Commun. Technol 5 (2), 125-140, 2011
112011
Perancangan Aturan Transformasi Uml –Systemc Dalam Perancangan Embedded System
M Abdurohman, K Kuspriyanto, S Sutikno, A Sasongko
Jurnal Ilmu Komputer dan Informasi 3 (2), 91-97, 2012
92012
Cognitive artificial intelligence countermeasure for enhancing the security of big data hardware from power analysis attack
SD Putra, ADW Sumari, AS Ahmad, S Sutikno, Y Kurniawan
Combating Security Challenges in the Age of Big Data: Powered by State-of …, 2020
82020
Transaction level modeling for early verification on embedded system design
M Abdurohman, K Kuspriyanto, S Sutikno, A Sasongko
2009 Eighth IEEE/ACIS International Conference on Computer and Information …, 2009
82009
The new block cipher: BC2
Y Kurniawan, MS Mardiyanto, I Supriana, S Sutikno
International Journal of Network Security 8 (1), 16-24, 2009
82009
General Model for Secure Electronic Cash Scheme.
DE Saputra, S Sutikno, SH Supangkat
Int. J. Netw. Secur. 21 (3), 501-510, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20