Now showing items 1-2 of 2

    • Construction of family of hash functions based on ideal lattice 

      Guritman, Sugi | Aliatiningtyas, Nur | Wulandari, Teduh | Ilyas, Muhammad (2015)
      Cryptographic hash function is a function h : D -> R with | D | >> | R | which has the security properties: one-way (computationally not feasible to calculate x e D from known y e R so that y = h(x)) and collision resistant ...
    • Konstruksi Kode Varshamov Biner Berjarak Minimum Rendah 

      Guritman, Sugi | Aliatiningtyas, Nur | Wulandari, Teduh | Ilyas, Muhammad (2013-09)
      Misalkan Fn2 menotasikan ruang vektor standar berdimensi n atas field biner F2 = {0,1}. Kode linear biner dengan panjang n didefinikan sebagai subruang C dari Fn2. Jika C berdimensi k dengan jarak minimum d, maka C dinyatakan ...