Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marisa W. Paryasto is active.

Publication


Featured researches published by Marisa W. Paryasto.


international conference on electrical engineering and informatics | 2011

Composite field multiplier based on look-up table for elliptic curve cryptography implementation

Marisa W. Paryasto; Budi Rahardjo; Fajar Yuliawan; Intan Muchtadi-Alamsyah; Kuspriyanto

In this work we propose the use of composite field to implement finite field multiplication, which will be use in ECC implementation. We use 299-bit keylength and GF((213)23) is used instead of GF(2299). Composite field multiplier can be implemented using conventional multiplication operation or using LUT (Look-Up Table). In this paper, LUT is used for multiplication in ground field and Karatsuba Offman Algorithm for the extension field multiplication. A generic architecture for the multiplier is presented. Implementation is done with VHDL with the target device Altera DE -2.


IOP Conference Series: Materials Science and Engineering | 2017

Realization and Addressing Analysis In Blockchain Bitcoin

Raja Sakti Arief Daulay; Surya Michrandi Nasution; Marisa W. Paryasto

The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.


IOP Conference Series: Materials Science and Engineering | 2017

Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin

Muhammad Reza Rizky Fauzi; Surya Michrandi Nasution; Marisa W. Paryasto

The present study discusses the workings of blockchain bitcoin in the transactions sector, on the development of todays emerging computers in the financial sector of blockchain bitcoin traction. In this case the author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions. Transaction is a data structure that encodes the transfer of values between users with in a bitcoin system. Every transaction is a public entry in this bitcoin blockchain. And become a large transaction bookkeeping global.


Procedia Computer Science | 2015

Information Concealment Through Noise Addition

Budi Rahardjo; Kuspriyanto; Intan Muchtadi-Alamsyah; Marisa W. Paryasto

Abstract A novel method of concealing information is proposed. Encrypted data is mixed with noise to add the security. The cost of an attack increases linearly with the size of the added noise. Since generating noise is cheap, the size of noise can be as large as possible. However, there are issues in automatically detecting and separating noise in the intended recipient end. This stegocrypto method also provides protection from traffic analysis attack.


international conference on information and communication technology | 2014

Big-data security management issues

Marisa W. Paryasto; Andry Alamsyah; Budi Rahardjo; Kuspriyanto


international conference on information and communication technology | 2016

Network text analysis to summarize online conversations for marketing intelligence efforts in telecommunication industry

Andry Alamsyah; Marisa W. Paryasto; Feriza J. Putra; Rizal Himmawan


international conference on information and communication technology | 2015

Indonesian music fans group identification using social network analysis in Kaskus forum

Immanuel Matthias Pandapotan; Andry Alamsyah; Marisa W. Paryasto


3rd International Conference on Computation for Science and Technology (ICCST-3) | 2015

Implementation of Finite Field Arithmetic Operations for Polynomial and Normal Basis Representations

Mirza Maulana; Wenny Franciska Senjaya; Budi Rahardjo; Intan Muchtadi-Alamsyah; Marisa W. Paryasto


2017 International Conference on Control, Electronics, Renewable Energy and Communications (ICCREC) | 2017

Analysis security metric on bro IPS based on CVSS and vea-bility metric

I. Made Dwi Suryadinata; Surya Michrandi Nasution; Marisa W. Paryasto


旭硝子財団助成研究成果報告 | 2014

Accelerating Parallelized Pollard Rho to Identify Weak Class Elliptic Curves

Intan Muchtadi; Budi Rahardjo; Marisa W. Paryasto

Collaboration


Dive into the Marisa W. Paryasto's collaboration.

Top Co-Authors

Avatar

Budi Rahardjo

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Intan Muchtadi-Alamsyah

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kuspriyanto

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fajar Yuliawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Intan Muchtadi Alamsyah

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge