Cryptographic Failures pada Website: System Literature Review
Abstract
Full Text:
PDF (Bahasa Indonesia)References
T. Redaksi, L. Tni, P. Drs, N. Sulistyo, and M. Han, “Laporan tahunan honeynet bssn
,” 2024.
C. N. Ganesh, S. Ahamad, V. Veeraiah, T. K. O, S. P. Patil, and A. Namdev, “Quantum
Computing: The Future of Secure Data Encryption and Problem Solving,” 2024 IEEE
th Uttar Pradesh Sect. Int. Conf. Electr. Electron. Comput. Eng., pp. 1–6, Nov. 2024,
doi: 10.1109/UPCON62832.2024.10983883.
A. Majeed and S. O. Hwang, “When AI Meets Information Privacy: The Adversarial Role
of AI in Data Sharing Scenario,” IEEE Access, vol. 11, pp. 76177–76195, 2023, doi:
1109/ACCESS.2023.3297646.
“A02 Cryptographic Failures - OWASP Top 10:2021.”
https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ (accessed May 30, 2025).
“Posisi Firma Hukum dalam Kasus Panama Papers - LK2 FHUI.”
https://lk2fhui.law.ui.ac.id/posisi-firma-hukum-dalam-kasus-panama-papers/
(accessed May 30, 2025).
R. J. Kikani, K. Verma, R. Navalakhe, G. Shrivastava, and V. Shrivastava,
“Cryptography: Recent research trends of encrypting mathematics,” Mater. Today
Proc., vol. 56, pp. 3247–3253, Jan. 2022, doi: 10.1016/J.MATPR.2021.09.378.
P. Nannipieri et al., “SHA2 and SHA-3 accelerator design in a 7 nm technology within
the European Processor Initiative,” Microprocess. Microsyst., vol. 87, p. 103444, Nov.
, doi: 10.1016/J.MICPRO.2020.103444.
G. Markowsky, “Was the 2006 Debian SSL Debacle a system accident?,” Proc. 2013
IEEE 7th Int. Conf. Intell. Data Acquis. Adv. Comput. Syst. IDAACS 2013, vol. 2, pp.
–629, 2013, doi: 10.1109/IDAACS.2013.6663000.
“Difference Between SHA1 and SHA2 | GeeksforGeeks.”
https://www.geeksforgeeks.org/difference-between-sha1-and-sha2/ (accessed May
, 2025).
Y. Chen and Y. Zhao, “Sign-then-encrypt with security enhancement and compressed
ciphertext,” Theor. Comput. Sci., vol. 1027, p. 115006, Feb. 2025, doi:
1016/J.TCS.2024.115006.
Y. Zhu, H. Li, J. Cui, and Y. Ma, “Verifiable Subgraph Matching with Cryptographic
Accumulators in Cloud Computing,” IEEE Access, vol. 7, pp. 169636–169645, 2019, doi: 10.1109/ACCESS.2019.2955243.
V. Grozov, M. Budko, A. Guirik, and M. Budko, “Efficiency Comparison of
Pseudorandom Number Generators Based on Strong Cryptographic Algorithms,” Int.
Congr. Ultra Mod. Telecommun. Control Syst. Work., vol. 2018-November, Jul. 2018,
doi: 10.1109/ICUMT.2018.8631223.
M. Althamir, A. Alabdulhay, and M. M. Yasin, “A Systematic Literature Review on
Symmetric and Asymmetric Encryption Comparison Key Size,” Proc. - 2023 3rd Int.
Conf. Smart Data Intell. ICSMDI 2023, pp. 110–117, 2023, doi:
1109/ICSMDI57622.2023.00027.
“Peter Selinger: MD5 Collision Demo.” https://www.mscs.dal.ca/~selinger/md5collision/
(accessed May 30, 2
DOI: https://doi.org/10.30998/dinamika.v2i1.8392
Refbacks
- There are currently no refbacks.

