[vc_empty_space][vc_empty_space][vc_row layout=”boxed” css=”.vc_custom_1624509994608{margin-top: 90px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1624519913689{border-right-width: 1px !important;border-right-color: #dbdbdb !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_row_inner layout=”boxed”][vc_column_inner]
[vc_empty_space][vc_btn title=”Lihat Profil Scopus” style=”gradient-custom” gradient_custom_color_1=”#00316d” gradient_custom_color_2=”#2071ea” size=”sm” align=”center” css_animation=”bounceInDown” link=”url:https%3A%2F%2Fwww.scopus.com%2Fauthid%2Fdetail.uri%3FauthorId%3D53265317600||target:%20_blank|”][/vc_column_inner][/vc_row_inner][vc_row_inner css=”.vc_custom_1624510077690{border-right-width: 1px !important;padding-top: 32px !important;border-right-color: #b2b2b2 !important;border-right-style: solid !important;border-radius: 1px !important;}”][/vc_row_inner][/vc_column][vc_column width=”2/3″][vc_row_inner][vc_column_inner css=”.vc_custom_1624509956940{border-left-width: 1px !important;border-left-color: #969696 !important;border-left-style: solid !important;border-radius: 1px !important;}”][megatron_heading title=”Fajar Yuliawan” size=”size-md” sub_title=”FMIPA” text_align=”text-left”][vc_separator][/vc_column_inner][/vc_row_inner][vc_column_text]Electrical and Electronic Engineering • Statistics and Probability • Applied Mathematics • Information Systems • Numerical Analysis • Theoretical Computer Science • Geometry and Topology • Algebra and Number Theory • Physics and Astronomy (all) • Computer Science (all)[/vc_column_text][/vc_column][/vc_row][vc_row layout=”boxed” css=”.vc_custom_1624522217430{margin-top: 20px !important;}”][vc_column][vc_tta_tabs style=”classic” color=”blue” spacing=”5″ active_section=”1″ no_fill_content_area=”true”][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-book” add_icon=”true” title=”Karya” tab_id=”karya”][vc_empty_space height=”20px”][vc_column_text]
On the category of weakly U-complexes
Gustina Elfiyanti,Intan Muchtadi-Alamsyah,Fajar Yuliawan,Dellavitha Nasution
European Journal of Pure and Applied Mathematics vol:13, issue:nybg.ejpam.v13i2.3673, page:1-345
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Permutation LDPC codes in McEliece cryptosystem
None Irwansyah,Intan Muchtadi-Alamsyah,Fajar Yuliawan
AIP Conference Proceedings vol:2192, issue:1.5139131, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields
None Wienardo,Budi Rahardjo,Fajar Yuliawan,Intan Muchtadi-Alamsyah
AIP Conference Proceedings vol:1677, issue:1.4930641, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Composite field multiplier based on look-up table for elliptic curve cryptography implementation
Marisa W. Paryasto,Budi Rahardjo,None Kuspriyanto,Fajar Yuliawan,Intan Muchtadi-Alamsyah
ITB Journal of Information and Communication Technology vol:6 C, issue:itbj.ict.2012.6.1.4, page:1-81
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Composite field multiplier based on look-up table for elliptic curve cryptography implementation
Marisa W. Paryasto,Budi Rahardjo,None Kuspriyanto,Fajar Yuliawan,Intan Muchtadi-Alamsyah
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021612, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-handshake-o” add_icon=”true” title=”Proyek” tab_id=”proyek”][vc_empty_space height=”20px”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-users” add_icon=”true” title=”Jejaring” tab_id=”jejaring”][vc_empty_space height=”20px”][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]