Browsing by Author Guritman, Sugi

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 133 to 145 of 145 < previous 
Issue DateTitleAuthor(s)
2024Skema Deteksi Kecurangan Pembagian Rahasia Berbasis Chinese Remainder TheoremGuritman, Sugi; Mas'oed, Teduh Wulandari; Ekaputri, Dhea
2018Skema Penandaan Digital ElGamal Berbasis Kurva Eliptik atas Lapangan Zp.Guritman, Sugi; Aliatiningtyas, Nur; Kurnia, Rian
2018Skema Penandaan Digital Rivest-Shamir- Adleman Berbasis Fungsi Pembagian Rahasia Asmuth BloomGuritman, Sugi; Aliatiningtyas, Nur; Setyoadji, Dewanto Surya
2012Submodule tertutup dan karakteristik direct summandAliyatiningtyas, Nur; Guritman, Sugi; Noviyanti, Yesi Retno
2015-12Survei Pola Grup Kristalografi Bidang Ragam Batik TradisionalGarnadi, Agah Drajat; Guritman, Sugi; Kusnanto, Ali; Hanum, Farida
2013The construction of greedy SVP LLL algorithmKhair, Saiful; Guritman, Sugi; Silalahi, Bib P.
2017Tinjauan Matematis Algoritme Kriptosistem Enkripsi ElGamal atas Field 𝔽�3𝑚�Guritman, Sugi; Aliatiningtyas, Nur; Rudiansyah, Soleh
2017Tinjauan Matematis Algoritme Kriptosistem Enkripsi ElGamal atas Field 𝔽�3𝑚�Guritman, Sugi; Aliatiningtyas, Nur; Rudiansyah, Soleh
2017Tinjauan Matematis Algoritme Persetujuan Kunci Diffie-Hellman atas Field .Guritman, Sugi; Aliatiningtyas, Nur; Saadillah, Amanata Ahsan
2005Triple des algorithm analysis for message disguisingWijaya, Sony Hartono; Guritman, Sugi; Kusuma, Wisnu Ananta
2012Utilization filtering to increase capacity message on PVD (Pixel Value Differences) steganographyGuritman, Sugi; Ridha, Ahmad; Azhari, Muhamad
2014Vulnerability Analysis of E-Voting System Pilkada Kota Bogor using Attack Trees.Guritman, Sugi; Rahmawan, Hendra; Kodarsyah
2012Watermarking audio menggunakan metode echo hidingGuritman, Sugi; Wibowo, Arief Hadi