Enter your keyword

Yusuf Kurniawan

[vc_empty_space][vc_empty_space][vc_row layout=”boxed” css=”.vc_custom_1624509994608{margin-top: 90px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1624519913689{border-right-width: 1px !important;border-right-color: #dbdbdb !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_row_inner layout=”boxed”][vc_column_inner]

Yusuf Kurniawan

[vc_empty_space][vc_btn title=”Lihat Profil Scopus” style=”gradient-custom” gradient_custom_color_1=”#00316d” gradient_custom_color_2=”#2071ea” size=”sm” align=”center” css_animation=”bounceInDown” link=”url:https%3A%2F%2Fwww.scopus.com%2Fauthid%2Fdetail.uri%3FauthorId%3D53264159600||target:%20_blank|”][/vc_column_inner][/vc_row_inner][vc_row_inner css=”.vc_custom_1624510077690{border-right-width: 1px !important;padding-top: 32px !important;border-right-color: #b2b2b2 !important;border-right-style: solid !important;border-radius: 1px !important;}”][/vc_row_inner][/vc_column][vc_column width=”2/3″][vc_row_inner][vc_column_inner css=”.vc_custom_1624509956940{border-left-width: 1px !important;border-left-color: #969696 !important;border-left-style: solid !important;border-radius: 1px !important;}”][megatron_heading title=”Yusuf Kurniawan” size=”size-md” sub_title=”STEI” text_align=”text-left”][vc_separator][/vc_column_inner][/vc_row_inner][vc_column_text]Health, Toxicology and Mutagenesis • Electrical and Electronic Engineering • Computer Vision and Pattern Recognition • Sociology and Political Science • Instrumentation • Artificial Intelligence • Computational Theory and Mathematics • Information Systems • Political Science and International Relations • Water Science and Technology • Safety Research • Computer Science Applications • Control and Optimization • Computer Networks and Communications • Signal Processing • Health Informatics • Communication • Safety, Risk, Reliability and Quality • Hardware and Architecture • Media Technology • Engineering (all) • Computer Science (all) • Chemical Engineering (all)[/vc_column_text][/vc_column][/vc_row][vc_row layout=”boxed” css=”.vc_custom_1624522217430{margin-top: 20px !important;}”][vc_column][vc_tta_tabs style=”classic” color=”blue” spacing=”5″ active_section=”1″ no_fill_content_area=”true”][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-book” add_icon=”true” title=”Karya” tab_id=”karya”][vc_empty_space height=”20px”][vc_column_text]
Block cipher four implementation on field programmable gate array
Yusuf Kurniawan,Muhammad Adli Rizqulloh
Communications in Science and Technology vol:5, issue:cst.5.2.2020.184, page:1-64

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The design of mini PGP security
Yusuf Kurniawan,Hari Rahyuwibowo,Aan Albone
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021726, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The new Block Cipher: BC2
Yusuf Kurniawan,A. Adang Suwandi,M. Sukrisno Mardiyanto,S. Iping Supriana,Sarwono Sutikno
International Journal of Network Security vol:8, issue:, page:1-24

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Hardware Trojan Design and Its Detection using Side-Channel Analysis on Cryptographic Hardware AES Implemented on FPGA
Bagus Hanindhito,Yusuf Kurniawan
Proceedings of the International Conference on Electrical Engineering and Informatics vol:2019-July, issue:ICEEI47359.2019.8988803, page:1-196

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Key management analysis of secure real time protocol version 2
Donny Seftyanto,Yusuf Kurniawan
2017 International Conference on Information Technology Systems and Innovation, ICITSI 2017 – Proceedings vol:2018-January, issue:ICITSI.2017.8267955, page:1-272

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Performance factors of a CUDA GPU parallel program: A case study on a PDF password cracking brute-force algorithm
Ignatius Leo Sri Hendarto,Yusuf Kurniawan
Proceedings – 2017 International Conference on Computer, Control, Informatics and its Applications: Emerging Trends In Computational Science and Engineering, IC3INA 2017 vol:2018-January, issue:IC3INA.2017.8251736, page:1-40

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of BC3 encryption algorithm on FPGA Zynq-7000
None Ma’Muri,Yusuf Kurniawan,Sarwono Sutikno
2017 International Symposium on Electronics and Smart Devices, ISESD 2017 vol:2018-January, issue:ISESD.2017.8253359, page:1-334

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Design of TCP SYN Flood DDoS attack detection using artificial immune systems
Gilang Ramadhan,Yusuf Kurniawan,Chang-Soo Kim
Proceedings of the 2016 6th International Conference on System Engineering and Technology, ICSET 2016 vol:, issue:FIT.2016.7857541, page:1-76

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Architecture for the secret-key BC3 cryptography algorithm
Arif Sasongko,Yusuf Kurniawan,Sarwono Sutikno,H. Hidayat
ITB Journal of Information and Communication Technology vol:5, issue:itbj.ict.2011.5.2.4, page:1-140

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Improved generalizations of the Karatsuba algorithm in GF(2n)
Muhamad Nursalman,Arif Sasongko,Yusuf Kurniawan,None Kuspriyanto
Proceedings – 2014 International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2014 vol:, issue:ICAICTA.2014.7005938, page:1-190

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Security analysis of BC3 algorithm for differential power analysis attack
Septafiansyah Dwi Putra,Mario Yudhiprawira,Yusuf Kurniawan,Sarwono Sutikno,Adang Suwandi Ahmad
2017 International Symposium on Electronics and Smart Devices, ISESD 2017 vol:2018-January, issue:ISESD.2017.8253361, page:1-345

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Security analysis testing for secure instant messaging in Android with study case: Telegram
Aditya Candra,Kyung-Hyune Rhee,Yusuf Kurniawan
Proceedings of the 2016 6th International Conference on System Engineering and Technology, ICSET 2016 vol:, issue:FIT.2016.7857545, page:1-96

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of ECC on Reconfigurable FPGA Using Hard Processor System
Hasbi Asshidiq,Arif Sasongko,Yusuf Kurniawan
ISESD 2018 – International Symposium on Electronics and Smart Devices: Smart Devices for Big Data Analytic and Machine Learning vol:, issue:ISESD.2018.8605444, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Generalizations of n-Term Karatsuba like Formulae in GF(2n) with NAYK algorithm
Muhamad Nursalman,Arif Sasongko,Yusuf Kurniawan,None Kuspriyanto
IAENG International Journal of Computer Science vol:44, issue:, page:1-420

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attacking AES-masking encryption device with correlation power analysis
Septafiansyah Dwi Putra,Adang Suwandi Ahmad,Sarwono Sutikno,Yusuf Kurniawan
International Journal of Communication Networks and Information Security vol:10, issue:, page:1-402

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
SOC design and FPGA implementation of Digital TV receiver
Amy Hamidah Salman,Trio Adiono,Willy Anugrah Cahyadi,Yusuf Kurniawan
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366036, page:1-129

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attack on AES Encryption Microcontroller Devices with Correlation Power Analysis
Faisal Rahman Nuradha,Muhammad Adli Rizqulloh,Septafiansyah Dwi Putra,Yusuf Kurniawan
Proceeding – 2019 International Symposium on Electronics and Smart Devices, ISESD 2019 vol:, issue:ISESD.2019.8909447, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Power analysis attack against encryption devices: A comprehensive analysis of AES, DES, and BC3
Septafiansyah Dwi Putra,Mario Yudhiprawira,Sarwono Sutikno,Yusuf Kurniawan,Adang Suwandi Ahmad
Telkomnika (Telecommunication Computing Electronics and Control) vol:17, issue:TELKOMNIKA.V17I3.9384, page:1-1289

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Revealing aes encryption device key on 328p microcontrollers with differential power analysis
Septafiansyah Dwi Putra,Adang Suwandi Ahmad,Sarwono Sutikno,Yusuf Kurniawan,Arwin Datumaya Wahyudi Sumari
International Journal of Electrical and Computer Engineering vol:8, issue:ijece.v8i6.pp.5144-5152, page:1-5152

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Cognitive Artificial Intelligence Countermeasure for Enhancing the Security of Big Data Hardware from Power Analysis Attack
Septafiansyah Dwi Putra,Arwin Datumaya Wahyudi Sumari,Adang Suwandi Ahmad,Sarwono Sutikno,Yusuf Kurniawan
Advanced Sciences and Technologies for Security Applications vol:, issue:978-3-030-35642-2_4, page:1-86

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-handshake-o” add_icon=”true” title=”Proyek” tab_id=”proyek”][vc_empty_space height=”20px”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-users” add_icon=”true” title=”Jejaring” tab_id=”jejaring”][vc_empty_space height=”20px”][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]