Nama Proyek | Peranan | Tahun | Pemberi project |
---|---|---|---|
Desain dan Analisis Sandi BCF | Leader | 2,015 | Kementrian Negara Riset dan Teknologi Republik Indonesia |
Prototype System Penerima DVB-T | Leader | 2,014 | Direktorat Penelitian dan Pengabdian kepada Masyarakat DIKTI KEMDIKBUD RI |
Prototype System Penerima DVB-T | Leader | 2,013 | Direktorat Penelitian dan Pengabdian kepada Masyarakat DIKTI KEMDIKBUD RI |
Prototype System Penerima DVB-T | Leader | 2,012 | Direktorat Penelitian dan Pengabdian kepada Masyarakat DIKTI KEMDIKBUD RI |
Keamanan Implementasi Aplikasi PGP (Pretty Good Privacy) | Leader | 2,010 | Kementrian Negara Riset dan Teknologi Republik Indonesia |
Nama publikasi | Penerbit | Pengarang | Tipe | Peranan | Tanggal terbit |
---|---|---|---|---|---|
Security Analysis Framework for Secure Instant Messaging in Android with Study Case: Telegram | IEEE 6th International Conference on System Engineering and Technology (ICSET), October 3-4, 2016 Bandung | Aditya Candra, Yusuf Kurniawan, Kyung-Hyune Rhee | International Proceeding | Co-Author | 10/03/2016 |
Design of TCP SYN Flood DDoS attack detection using artificial immune systems | Proceedings of the 2016 6th International Conference on System Engineering and Technology, ICSET 2016; vol.; Issue.; Art.7857541; page.72-76; DOI. 10.1109/FIT.2016.7857541 | Ramadhan G., Kurniawan Y., Kim C.-S. | International Proceeding | Author | 10/03/2016 |
Security analysis testing for secure instant messaging in Android with study case: Telegram | Proceedings of the 2016 6th International Conference on System Engineering and Technology, ICSET 2016; vol.; Issue.; Art.7857545; page.92-96; DOI. 10.1109/FIT.2016.7857545 | Candra A., Kurniawan Y., Rhee K.-H. | International Proceeding | Co-Author | 10/03/2016 |
Diversity Combining Using Maxima Ratio Combining for All Modulation Mode | TELKOMNIKA, Vol.12, No.3, June 2014, pp. 733-740ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013DOI: 10.12928/TELKOMNIKA.v12i2.2058 | Yusuf Kurniawan, Andyes Fourman D.A. Sudirja | International Journal | Author | 12/31/2014 |
Improved Generalizations of The Karatsuba Algorithm in GF(2n) | The 2014 International Conference on Advanced Informatics: Concepts, Theory and Applications August 20-21th, 2014 ISSN: 2337-5787 | Muhamad Nursalman, Arif Sasongko, Yusuf Kurniawan, Kuspriyanto | International Proceeding | Co-Author | 12/31/2014 |
Architecture Design and Implementation of KOA Multiplier for Small Bits in Galois Field | 2013 IEEE International Conference on Electronics Technology and Industry Development, October 23 – 24, 2013, Bali, Indonesia, October 23 – 24, 2013, Bali, Indonesia | Muhamad Nursalman, Arif Sasongko, Yusuf Kurniawan, Sarwono Sutikno | International Proceeding | Co-Author | 12/31/2013 |
SOC Design and FPGA Implementation of Digital TV Receiver | The 7th International Conference on Telematics System, Services, and Applications (TSSA), 30-31 October 2012 ISBN: 978-1-4673-4548-5 | Amy Hamidah Salman, Trio Adiono, Willy Anugrah Cahyadi, Yusuf Kurniawan | International Proceeding | Author | 12/31/2012 |
The SoC Design And FPGA Implementation Of Digital TV Receiver | Proceedings of the 1st International Workshop on Industrial IT Convergence, Bandung, Indonesia August 28-29, 2012. | Willy Anugrah Cahyadi, Trio Adiono, Amy Hamidah Salman and Yusuf Kurniawan | International Proceeding | Author | 12/31/2012 |
Architecture for the Secret-Key Bc3 Cryptography Algorithm | ITB J. ICT, Vol. 5, No. 2, 2011, 125-140 125 | Arif Sasongko, Hidayat, Yusuf Kurniawan & Sarwono Sutikno | International Journal | Co-Author | 12/31/2011 |
The Design Of Mini PGP Security | International Conference on Electrical Engineering and Informatics (ICEEI 2011) 17-19 Juli 2011. ISBN: 978-1-4577-0750-6, IEEE Catalog Number: CFP1177H-PRT | Yusuf Kurniawan, Aan Albone, Hari Rahyuwibowo | International Proceeding | Author | 12/31/2011 |
The New Block Cipher : BC2 | International journal of Network Security (IJNS), ISSN 1816-353X, Vol. 8, No.1 (Jan.2009) | Yusuf Kurniawan, Adang Suwandi A, M.Sukrisno Mardiyanto, Iping Supriana S, and Sarwono Sutikno, | International Journal | Author | 12/31/2009 |
Analisis Sandi Diferensial Terpotong (Truncated Differential Attack) Terhadap Data Encryption Standard (DES) | Yusuf Kurniawan, Adang Suwandi A. , M. Sukrisno Mardiyanto, Iping Supriana, Sarwono Sutikno | National Proceeding | Author | 12/31/2006 | |
Analisis Sandi Square terhadap Advanced Encryption Standard (AES) | Yusuf Kurniawan, Adang Suwandi A. , M. Sukrisno Mardiyanto, Iping Supriana S. , Sarwono Sutikno | National Proceeding | Author | 12/31/2006 |
Nama | Semester | SKS | Peranan |
---|---|---|---|
EL2142:Sistem Digital & Mikroprosesor | 1-2015/2016 | 4 | Core |
EL4090:Tugas Akhir I (Capstone Design) | 1-2015/2016 | 3 | Core |
EL5111:Kriptografi dan Aplikasinya | III-2014/2015 | 3 | Core |
EL2002:Sistem Digital | II-2014/2015 | 4 | Core |
EL5111:Kriptografi dan Aplikasinya | II-2014/2015 | 3 | Core |
EL2205:Praktikum Elektronika | II-2014/2015 | 1 | Core |
EL2005:Elektronika | II-2014/2015 | 3 | Core |
EL5111:Kriptografi dan Aplikasinya | I-2014/2015 | 3 | Core |
Sistem Digital & Mikroprosesor | I-2014/2015 | 4 | Core |
EL4090:Tugas Akhir I (Capstone Design) | I-2014/2015 | 3 | Core |
EL2002:Sistem Digital | II-2013/2014 | 4 | Core |
EL5111:Kriptografi dan Aplikasinya | II-2013/2014 | 3 | Core |
EL2005:Elektronika | II-2013/2014 | 3 | Core |
EL2205:Praktikum Elektronika | II-2013/2014 | 1 | Core |
EL4090:Tugas Akhir I (Capstone Design) | I-2013/2014 | 3 | Core |
EL6113:Keamanan Jaringan & Kriptografi | 3-2012/2013 | 3 | Core |
Dasar Elektronika (AE) | 2-2012/2013 | 3 | Core |
EL2140:Praktikum Elektronika | 2-2012/2013 | 1 | Core |
EL2040:Elektronika | 2-2012/2013 | 3 | Core |
EL4096:Tugas Akhir I & Seminar | 1-2012/2013 | 2 | Core |
EL2195:Praktikum Sistem Digital | 1-2012/2013 | 1 | Core |
EL2095:Sistem Digital | 1-2012/2013 | 3 | Core |
EL2140:Praktikum Elektronika | 2-2011/2012 | 1 | Core |
Dasar Elektronika (AE) | 2-2011/2012 | 3 | Core |
EL2040:Elektronika | 2-2011/2012 | 3 | Core |
Dasar Elektronika (AE) | 2-2010/2011 | 3 | Core |
EL2040:Elektronika | 2-2010/2011 | 3 | Core |
EL2195:Praktikum Sistem Digital | 1-2010/2011 | 1 | Core |
EL2095:Sistem Digital | 1-2010/2011 | 3 | Core |
EL2040:Elektronika | 2-2009/2010 | 3 | Core |
Dasar Elektronika (AE) | 2-2009/2010 | 3 | Core |
EL5099:Metoda Penelitian | 2-2009/2010 | 3 | Core |
Elektronika Industri (TI) | 1-2009/2010 | 2 | Core |
EL2095:Sistem Digital | 1-2009/2010 | 3 | Core |
EL2195:Praktikum Sistem Digital | 1-2009/2010 | 1 | Core |
EL2095:Sistem Digital | 1-2008/2009 | 3 | Core |
Dasar Elektronika | 2-2007/2008 | 3 | Core |
Title | Start | Finish | Seq |
---|---|---|---|
Analisis Keamanan End-to-End Encryption pada Telegram Messenger | 08/01/2015 | 03/14/2016 | 1 |
Secure Channel Protocol untuk Sistem Electronic Health Record Berbasis Smart Card | 08/01/2015 | 03/14/2016 | 1 |
Studi Keamanan Informasi pada KTP-el | 01/01/2015 | 09/28/2015 | 1 |
Implementasi Elliptical Curve Digital Signature Algorithm (ECDSA) pada Smartcard untuk Sistem E-Health | 01/01/2015 | 06/23/2015 | 1 |
Perancangan Protection Profile dan Security Target untuk E-Health SmartCard Reader berdasarkan SNI ISO/IEC 15408 : 2014 | 01/01/2015 | 09/28/2015 | 2 |
Perancangan dan Implementasi Pemrograman Smart Card untuk Keamanan pada Sistem E-Health | 01/01/2015 | 06/23/2015 | 1 |
Implementasi Keamanan pada Sistem Penyimpanan Data di Database untuk Sistem E-Health | 01/01/2015 | 06/23/2015 | 1 |
Implementasi Pertukaran Kunci Diffie-Hellman untuk Telepon Seluler Antisadap | 08/01/2014 | 03/10/2015 | 1 |
Implementasi Enkripsi dan Dekripsi pada Komunikasi Telepon Seluler Berbasis VoIP | 08/01/2014 | 03/10/2015 | 1 |
Implementasi Twofish dan Secure Hash Algorithm untuk Pembaruan Kunci | 08/01/2014 | 03/10/2015 | 1 |
Simulasi Keamanan AES-CBC Pada Secure Socket Layer V 3.0 | 08/01/2014 | 03/09/2015 | 1 |
Analisis dan Manipulasi LogFile pada System Operasi Windows 7 | 01/01/2014 | 09/29/2014 | 1 |
Analisis Keamanan RC4 Dengan Simulasi Analisis Sandi pada Transport Layer Security | 01/01/2014 | 06/26/2014 | 1 |
Pemalusan Tanda Tangan Digital dan Simulasi Penyebaran Virus | 01/01/2014 | 06/26/2014 | 1 |
Pemecahan Password File PDF dengan Metode Brute Force Menggunakan NVIDIA CUDA | 01/01/2014 | 06/26/2014 | 1 |
Desain dan Implementasi Sistem Keamanan Pada Prototipe Perangkat Secure Two-Way Radio | 08/01/2013 | 03/18/2014 | 1 |
Perancangan dan Implementasi User Interface dan Controller pada Prototype Secure Two-Way Radio | 08/01/2013 | 03/18/2014 | 1 |
Desain Sistem Komunikasi Suara dan Implementasi Pembangkit Kunci Master Pada Prototipe Sequre Two-Way Radio | 08/01/2013 | 03/18/2014 | 1 |
Keamanan Suara Pada Android | 01/01/2013 | 10/01/2013 | 1 |
Perancangan Dan Implementasi Sistem Kriptografi Data Komunikasi Untuk Sistem Keamanan Suara VoIP Di Telepon Selular Berbasis Android | 01/01/2013 | 10/01/2013 | 1 |
Sistem Keamanan Suara Pada VOiP Bagian Komunikasi Data | 01/01/2013 | 10/01/2013 | 1 |
Perancangan dan Implementasi Graphical User Interface Software untuk Hardware Firewall Pada FPGA | 01/01/2012 | 10/02/2012 | 1 |
Analisis Keamanan Metode Sucure Deletion Dengan Teknik Penimpaan Pada Media Penyimpanan Hard Disk | 01/01/2012 | 10/02/2012 | 1 |
Implementasi Miller-Rabin Primality Test Untuk Pembangkitan Kunci RSA | 01/01/2012 | 06/26/2012 | 1 |
Perancangan dan Implementasi Antarmuka Ethernet dan Serial Untuk Firewall Berbasis Hardware Pada FPGA | 01/01/2012 | 10/02/2012 | 2 |
Perancangan dan Implementasi Software Antarmuka Layer Physical Dan MAC pada Teknologi LTE | 01/01/2012 | 10/02/2012 | 1 |
Perancangan Dan Implementasi Reconfigurable PCE Pada Hardware Firewall | 01/01/2012 | 10/02/2012 | 3 |
Integrasi Desain Dan Analisis Side Channel Attack Hardware RSA Pada Implementasi FPGA | 01/01/2012 | 06/26/2012 | 1 |
Perancangan Dan Implementasi Hardware Perkalian Montgomery Dan Invers Modular |