Enter your keyword

Sarwono Sutikno

[vc_empty_space][vc_empty_space][vc_row layout=”boxed” css=”.vc_custom_1624509994608{margin-top: 90px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1624519913689{border-right-width: 1px !important;border-right-color: #dbdbdb !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_row_inner layout=”boxed”][vc_column_inner]

Sarwono Sutikno

[vc_empty_space][vc_btn title=”Lihat Profil Scopus” style=”gradient-custom” gradient_custom_color_1=”#00316d” gradient_custom_color_2=”#2071ea” size=”sm” align=”center” css_animation=”bounceInDown” link=”url:https%3A%2F%2Fwww.scopus.com%2Fauthid%2Fdetail.uri%3FauthorId%3D6602717309||target:%20_blank|”][/vc_column_inner][/vc_row_inner][vc_row_inner css=”.vc_custom_1624510077690{border-right-width: 1px !important;padding-top: 32px !important;border-right-color: #b2b2b2 !important;border-right-style: solid !important;border-radius: 1px !important;}”][/vc_row_inner][/vc_column][vc_column width=”2/3″][vc_row_inner][vc_column_inner css=”.vc_custom_1624509956940{border-left-width: 1px !important;border-left-color: #969696 !important;border-left-style: solid !important;border-radius: 1px !important;}”][megatron_heading title=”Sarwono Sutikno” size=”size-md” sub_title=”STEI” text_align=”text-left”][vc_separator][/vc_column_inner][/vc_row_inner][vc_column_text]Health, Toxicology and Mutagenesis • Electronic, Optical and Magnetic Materials • Energy Engineering and Power Technology • Electrical and Electronic Engineering • Software • Social Sciences (miscellaneous) • Instrumentation • Artificial Intelligence • Computational Theory and Mathematics • Information Systems • Political Science and International Relations • Safety Research • Transportation • Computer Science Applications • Control and Optimization • Computer Networks and Communications • Information Systems and Management • Management Information Systems • Signal Processing • Communication • Safety, Risk, Reliability and Quality • Hardware and Architecture • Materials Science (all) • Engineering (all) • Computer Science (all)[/vc_column_text][/vc_column][/vc_row][vc_row layout=”boxed” css=”.vc_custom_1624522217430{margin-top: 20px !important;}”][vc_column][vc_tta_tabs style=”classic” color=”blue” spacing=”5″ active_section=”1″ no_fill_content_area=”true”][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-book” add_icon=”true” title=”Karya” tab_id=”karya”][vc_empty_space height=”20px”][vc_column_text]
Design and implementation of arithmetic processor F2(155) for elliptic curve cryptosystems
Sarwono Sutikno,Ronny Effendi,Andy Surya
IEEE Asia-Pacific Conference on Circuits and Systems – Proceedings vol:, issue:, page:1-650

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of ElGamal elliptic curves cryptosystems
Sarwono Sutikno,Andy Surya,Ronny Effendi
IEEE Asia-Pacific Conference on Circuits and Systems – Proceedings vol:, issue:, page:1-486

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Architecture of F2(2N) multiplier for elliptic curves cryptosystem
Sarwono Sutikno,Andy Surya
Proceedings – IEEE International Symposium on Circuits and Systems vol:1, issue:, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The assessment of information security management process capability using ISO/IEC 33072:2016 (Case study in Statistics Indonesia)
Yeni Rimawati,Sarwono Sutikno
2016 International Conference on Information Technology Systems and Innovation, ICITSI 2016 – Proceedings vol:, issue:ICITSI.2016.7858209, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Reducing Blokchain Size Using Complementary Block
Dany Eka Saputra,Sarwono Sutikno,Suhono Harso Supangkat
Proceeding – 2019 International Conference on ICT for Smart Society: Innovation and Transformation Toward Smart Region, ICISS 2019 vol:, issue:ICISS48059.2019.8969790, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
DLX processor enhancement for AES rijndael crypto algorithm
Maman Abdurohman,Sarwono Sutikno
IEEE Region 10 Annual International Conference, Proceedings/TENCON vol:, issue:TENCON.2006.344093, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Model design of information security governance assessment with collaborative integration of COBIT 5 and ITIL (case study: INTRAC)
Perdana Kusumah,Sarwono Sutikno,Yusep Rosmansyah
Proceedings – 2014 International Conference on ICT for Smart Society: “Smart System Platform Development for City and Society, GoeSmart 2014”, ICISS 2014 vol:, issue:ICTSS.2014.7013193, page:1-6

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Peer-to-peer electronic cash using identity based signcryption
Dany Eka Saputra,Sarwono Sutikno,Suhono Harso Supangkat
International Journal on Electrical Engineering and Informatics vol:10, issue:ijeei.2018.10.2.13, page:1-394

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Development of protection profile and security target for Indonesia electronic ID card’s (KTP-el) card reader based on common criteria V3.1:2012/SNI ISO/IEC 15408:2014
Muhamad Erza Aminanto,Sarwono Sutikno
Proceedings – 2014 International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2014 vol:, issue:ICAICTA.2014.7005905, page:1-6

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Design of e-Government Security Governance System Using COBIT 2019: (Trial Implementation in Badan XYZ)
Vira Septiyana Kasma,Sarwono Sutikno,Kridanto Surendro
Proceeding – 2019 International Conference on ICT for Smart Society: Innovation and Transformation Toward Smart Region, ICISS 2019 vol:, issue:ICISS48059.2019.8969808, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Numerical method for evaluating E-cash security
Dany Eka Saputra,Sarwono Sutikno,Suhono Harso Supangkat
Telkomnika (Telecommunication Computing Electronics and Control) vol:16, issue:TELKOMNIKA.v16i6.9811, page:1-2675

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Measuring effectiveness of control of information security management system based on SNI ISO/IEC 27004: 2013 standard
A.P. Aldya,S. Sutikno,Y. Rosmansyah
IOP Conference Series: Materials Science and Engineering vol:550, issue:012020, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Analysis of cause and effect relationship risk using fishbone diagram in SDLC SPASI v. 4.0 business process
Azzahra Ratu Kamila,Sarwono Sutikno
2016 International Conference on Information Technology Systems and Innovation, ICITSI 2016 – Proceedings vol:, issue:ICITSI.2016.7858186, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Review and classification of electronic cash research
Dany Eka Saputra,Suhono Harso Supangkat,Sarwono Sutikno
2015 International Conference on Information Technology Systems and Innovation, ICITSI 2015 – Proceedings vol:, issue:ICITSI.2015.7437703, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Power analysis attack against encryption devices: A comprehensive analysis of AES, DES, and BC3
Septafiansyah Dwi Putra,Mario Yudhiprawira,Sarwono Sutikno,Yusuf Kurniawan,Adang Suwandi Ahmad
Telkomnika (Telecommunication Computing Electronics and Control) vol:17, issue:TELKOMNIKA.V17I3.9384, page:1-1289

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Revealing aes encryption device key on 328p microcontrollers with differential power analysis
Septafiansyah Dwi Putra,Adang Suwandi Ahmad,Sarwono Sutikno,Yusuf Kurniawan,Arwin Datumaya Wahyudi Sumari
International Journal of Electrical and Computer Engineering vol:8, issue:ijece.v8i6.pp.5144-5152, page:1-5152

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attacking AES-masking encryption device with correlation power analysis
Septafiansyah Dwi Putra,Adang Suwandi Ahmad,Sarwono Sutikno,Yusuf Kurniawan
International Journal of Communication Networks and Information Security vol:10, issue:, page:1-402

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of BC3 encryption algorithm on FPGA Zynq-7000
None Ma’Muri,Yusuf Kurniawan,Sarwono Sutikno
2017 International Symposium on Electronics and Smart Devices, ISESD 2017 vol:2018-January, issue:ISESD.2017.8253359, page:1-334

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
DPA-countermeasure with knowledge growing system
Septafiansyah Dwi Putra,Adang Suwandi Ahmad,Sarwono Sutikno
2016 International Symposium on Electronics and Smart Devices, ISESD 2016 vol:, issue:ISESD.2016.7886757, page:1-20

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Power analysis attack on implementation of des
Septafiansyah Dwi Putra,Adang Suwandi Ahmad,Sarwono Sutikno
2016 International Conference on Information Technology Systems and Innovation, ICITSI 2016 – Proceedings vol:, issue:ICITSI.2016.7858246, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Group signature based ethereum transaction
Intan Muchtadi-Alamsyah,Muhammad Thufaili Imdad,Sarwono Sutikno
International Journal on Electrical Engineering and Informatics vol:12, issue:ijeei.2020.12.1.2, page:1-32

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The measurement design of information security management system
Merry Nancylia,Eddy K. Mudjtabar,Sarwono Sutikno,Yusep Rosmansyah
Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014 vol:, issue:TSSA.2014.7065914, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Integrated implementation of service and information security management system
Septafiansyah Dwi Putra,Imam Asrowardi,Sarwono Sutikno,Yusep Rosmansyah
Proceedings – 2014 International Conference on ICT for Smart Society: “Smart System Platform Development for City and Society, GoeSmart 2014”, ICISS 2014 vol:, issue:ICTSS.2014.7013171, page:1-191

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Architecture for the secret-key BC3 cryptography algorithm
Arif Sasongko,Yusuf Kurniawan,Sarwono Sutikno,H. Hidayat
ITB Journal of Information and Communication Technology vol:5, issue:itbj.ict.2011.5.2.4, page:1-140

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Model transformation method of embedded system hardware for improving design process performance
Arif Sasongko,None Kuspriyanto,Sarwono Sutikno,Maman Abdurohman
International Journal on Electrical Engineering and Informatics vol:3, issue:ijeei.2011.3.2.7, page:1-233

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Effeciency enhancement in embedded system design using UML 2.0 and TLM modeling
Maman Abdurohman,None Kuspriyanto,Sarwono Sutikno,Arif Sasongko
ICCET 2010 – 2010 International Conference on Computer Engineering and Technology, Proceedings vol:1, issue:ICCET.2010.5486336, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach
Rinaldi Munir,Bambang Riyanto Tan,Sarwono Sutikno,Wiseto P. Agung
Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009 vol:1, issue:ICEEI.2009.5254778, page:1-268

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Transaction level modeling for early verification on embedded system design
Maman Abdurohman,None Kuspriyanto,Sarwono Sutikno,Arif Sasongko
Proceedings of the 2009 8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009 vol:, issue:ICIS.2009.41, page:1-282

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Issues in elliptic curve cryptography implementation
Marisa W. Paryasto,None Kuspriyanto,Sarwono Sutikno,Arif Sasongko
Internetworking Indonesia Journal vol:1, issue:, page:1-33

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach
Rinaldi Munir,T. Bambang Riyanto,Sarwono Sutikno,Wiseto P. Agung
International Journal on Electrical Engineering and Informatics vol:1, issue:ijeei.2009.1.2.4, page:1-136

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Cognitive Artificial Intelligence Countermeasure for Enhancing the Security of Big Data Hardware from Power Analysis Attack
Septafiansyah Dwi Putra,Arwin Datumaya Wahyudi Sumari,Adang Suwandi Ahmad,Sarwono Sutikno,Yusuf Kurniawan
Advanced Sciences and Technologies for Security Applications vol:, issue:978-3-030-35642-2_4, page:1-86

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Security analysis of BC3 algorithm for differential power analysis attack
Septafiansyah Dwi Putra,Mario Yudhiprawira,Yusuf Kurniawan,Sarwono Sutikno,Adang Suwandi Ahmad
2017 International Symposium on Electronics and Smart Devices, ISESD 2017 vol:2018-January, issue:ISESD.2017.8253361, page:1-345

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
VHDL design and simulation of MAM memory for LAPCAM parallel architecture for image processing
I. Darmawan,W.T. Hartono,E. Mozef,S. Sutikno,None Kuspriyanto
IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS vol:1, issue:APCCAS.2002.1114976, page:1-392

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
NAIDS design using ChiMIC-KGS
Herman R.A. Talompo,Adang Suwandi Ahmad,Yudi S. Gondokaryono,Sarwono Sutikno
2017 International Symposium on Electronics and Smart Devices, ISESD 2017 vol:2018-January, issue:ISESD.2017.8253362, page:1-351

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Detection of interviewer falsification in statistics Indonesia’s mobile survey
Yusep Rosmansyah,Ariq Bani Hardi,Atina Putri,Sarwono Sutikno,Ibnu Santoso
International Journal on Electrical Engineering and Informatics vol:11, issue:ijeei.2019.11.3.2, page:1-484

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The new Block Cipher: BC2
Yusuf Kurniawan,A. Adang Suwandi,M. Sukrisno Mardiyanto,S. Iping Supriana,Sarwono Sutikno
International Journal of Network Security vol:8, issue:, page:1-24

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-handshake-o” add_icon=”true” title=”Proyek” tab_id=”proyek”][vc_empty_space height=”20px”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-users” add_icon=”true” title=”Jejaring” tab_id=”jejaring”][vc_empty_space height=”20px”][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]