Follow
Andriani Adi Lestari
Andriani Adi Lestari
Politeknik Siber dan Sandi Negara
Verified email at poltekssn.ac.id
Title
Cited by
Cited by
Year
A novel discrete-time chaos-function-based random-number generator: design and variability Analysis
M Magfirawaty, AA Lestari, ARA Nurwa, S MT, K Ramli
Symmetry 14 (10), 2122, 2022
22022
A tutorial of boomerang attack on SMALLPRESENT-[4]
IW Hutahaean, AA Lestari, BH Susanti
Journal of Physics: Conference Series 1836 (1), 012029, 2021
22021
Modified logistic maps for discrete time chaos based random number generator
AA Lestari, MT Suryadi, K Ramli
2018 International Conference on Electrical Engineering and Computer Science …, 2018
22018
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
S Windarta, S Suryadi, K Ramli, AA Lestari, W Wildan, B Pranggono, ...
IEEE Access, 2023
12023
Attendance System Using Two Factor Authentication Based on Secure App with Flutter
D Irwansyah, IKS Buana, H Setiawan, AA Lestari
2022 IEEE 8th Information Technology International Seminar (ITIS), 328-332, 2022
12022
Implementasi Secure Storage Menggunakan Metode Full Disk Encryption dan Tamper Proof pada Cloud Storage
B Rizqi, AA Lestari
Info Kripto 17 (1), 33-40, 2023
2023
Serangan Integral pada Algoritme TS-2
BH Susanti, AA Lestari, NPR Adiati, DD Karlina
Politeknik Siber dan Sandi Negara, 2023
2023
Rancang bangun dongle cryptoprocessor untuk tanda tangan elektronik dokumen berbasis secure hardware
AA Lestari, M Syahral, ARA Nurwa, B Prakoso
Politeknik Siber dan Sandi Negara, 2023
2023
Hortex: Fungsi Hash Chaotic Sponge
BH Susanti, S Indarjani, AA Lestari, IH Masri
Language 15, 54halaman, 2023
2023
Formal Analysis of SMAP Fog/Edge Protocol Using AVISPA
AD Azzahra, Y Farida, AA Lestari
2022 1st International Conference on Smart Technology, Applied Informatics …, 2022
2022
Second Preimage Attack pada Skema Davies-Meyer Berbasis SIMECK32/64 Menggunakan Metode Kortelainen
AB Putranto, AA Lestari
Info Kripto 15 (2), 87-95, 2021
2021
Serangan Universal Forgery pada Skema Fungsi Hash Ft, LightMAC_Plus, dan LightMAC_Plus2 Berbasis Algoritme DLBCA
M Ridwan, AA Lestari
Info Kripto 15 (1), 55-61, 2021
2021
Kriptanalisis Diferensial Takmungkin pada Algoritme DLBCA Empat dan Lima Putaran Menggunakan Teknik Miss-In-The-Middle
AA Lestari, NS Ul-Haq
Sekolah Tinggi Sandi Negara, 2019
2019
Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF (2 8)
AA Lestari, N Yulianingsih
The system can't perform the operation now. Try again later.
Articles 1–14