Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Antonius Cahya Prihandoko"'
Publikováno v:
Aksioma: Jurnal Program Studi Pendidikan Matematika, Vol 11, Iss 2, Pp 1282-1296 (2022)
This study aims to develop a mathematics learning tool consisting of a Learning Implementation Plan (RPP), Student Worksheet (LKS), and a Computational Thinking Test (CT Test) using the Search, Solve, Create, and Share (SSCS) learning model with a Re
Externí odkaz:
https://doaj.org/article/2013e625d34146818fe7f50650296d52
Publikováno v:
Jurnal Teknologi dan Sistem Komputer, Vol 9, Iss 2, Pp 106-112 (2021)
Penelitian ini bertujuan mengembangkan alternatif otentikasi dengan menerapkan metode steganografi Histogram shifting. Media yang digunakan untuk otentikasi adalah media citra. Histogram shifting memanfaatkan histogram suatu citra untuk menyisipkan p
Externí odkaz:
https://doaj.org/article/356bff59db0b480da4d1129df24ae7e7
Publikováno v:
Berkala Sainstek, Vol 8, Iss 3, Pp 65-74 (2020)
Serpent dan Twofish merupakan algoritma kriptografi yang menduduki peringkat kedua dan ketiga dalam kompetisi Advanced Encryption Standard (AES). Penelitian ini bertujuan untuk mengetahui algoritma mana yang lebih unggul dalam proses enkripsi dan dek
Externí odkaz:
https://doaj.org/article/7ecac015f9314a2ebf0d66c71f9306b6
Publikováno v:
Indonesian Journal of Combinatorics, Vol 4, Iss 1, Pp 21-26 (2020)
SuperH-antimagic total labeling (SHATL) can be utilized to generate encryption keys. The keys are then used to establish the improved block and stream ciphers. In these ciphers, different blocks were encrypted by the different keys, but all block key
Externí odkaz:
https://doaj.org/article/57e2858e2a40454299abbbeb8acff0a9
Publikováno v:
Indonesian Journal of Combinatorics, Vol 3, Iss 1, Pp 14-23 (2019)
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of su
Externí odkaz:
https://doaj.org/article/b4e01c71b530475fb73f76fd63fe3b43
This paper address the cryptographic keys management problem: how to generate the cryptographic keys and apply them to secure encryption. The purpose of this research was to study on utilizing graph labeling for generating stream-keys and implementin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::79082957153400c39539a114eedfbc13
https://zenodo.org/record/6775052
https://zenodo.org/record/6775052
Publikováno v:
Jurnal Teknologi dan Sistem Komputer. 9:106-112
Penelitian ini bertujuan mengembangkan alternatif otentikasi dengan menerapkan metode steganografi Histogram shifting. Media yang digunakan untuk otentikasi adalah media citra. Histogram shifting memanfaatkan histogram suatu citra untuk menyisipkan p
Publikováno v:
2021 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE).
Publikováno v:
2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE).
Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure
Autor:
Susanto, Randi Pratama Murtikusuma, Hobri, Antonius Cahya Prihandoko, P Maharani, N F D Hadiyanti, N Khasanah
Publikováno v:
Journal of Physics: Conference Series. 1839:012031
The research conducted was a research on media development in the form of electronic module in mathematics learning using a STEM-Collaborative Project Based Learning model which is believed to improve the mathematical literacy skills of vocational hi