Penelitian ini bertujuan untuk mengetahui peran teman sebaya dalam pembentukan karakter siswa di MTs YAPI Pakem. Penelitian ini merupakan penelitian kualitatif yang menggunakan pendekatan fenomenologi. Pengumpulan data melalui observasi, wawancara, dan dokumentasi. Keabsahan data diperoleh melalui triangulasi. Analisis data menggunakan analisis model yang dikembangkan oleh Miles Huberman. Hasil penelitian adalah sebagai berikut. 1. Teman sebaya memiliki berbagai peran penting bagi siswa MTs YAPI Pakem, yaitu: a. memberikan dukungan terhadap siswa, b. mengajarkan berbagai keterampilan sosial, c. menjadi agen sosialisasi bagi siswa, dan d. menjadi model atau contoh berperilaku bagi siswa lain. 2. Teman sebaya memiliki peran dalam membentuk berbagai karakter siswa, yaitu religius, toleransi, disiplin, kerja keras, rasa ingin tahu, bersahabat, peduli lingkungan, peduli sosial, membangkang, dan agresif.
Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware's power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
This paper aims to estimate the effect of corruption (represented by data of Corruption Perception Index) and human development (represented by data of Human Development Index) on the economic growth (represented by data of Gross Domestic Product) in 44 (forty-four) countries who join the Organization of Islamic Cooperation (OIC). this paper uses multiple linear regression with panel data of Corruption Perception Index from transparency.org, Human Development Index from United Nations Development Program (UNDP) and Gross Domestic Product from World Bank. The 10 years range of data (2009-2018) finds the Corruption Perception Index does not have a significant effect on the economic growth, but The Human Development Index has a positive significant effect on the economic growth or Gross Domestic Product. It can be seen that the commitment of OIC countries in human development is on the right path, since they are in line with their economic growth rates. When viewed together, the Corruption Perception Index and the Human Development Index have a simultaneous influence on the economic growth. So, this result is important to help the OIC as additional references to their Annual Summit or Conference to focus more on Human Development strategy to enhance the economic growth.
This study analyzes the value of firms in Indonesia as the Most Trusted Company. Independent variables include: Good Corporate Governance (GCG), capital structure, dividend policy and profitability. While the dependent variable is the value of the company. Company value is proxied by Price Book Value (PBV). The purpose of this study was to analyze the effect of capital structure, dividend policy, profitability and GCG on corporate value, either simultaneously or partially. This research was conducted at public go public company in Indonesia which entered into Indonesia Most Trusted Companies in 2015. The research population is a company that go public in Bursa Efek Indonesia. The sampling technique uses purposive sampling. The sample of research company that entered Indonesia Most Trusted Company in 2015. Indonesia Most Trusted Company is a company that apply GCG and published SWA Magazine. The sample size is 25 companies. The analysis technique used multiple regression. The results showed that simultaneously GCG, capital structure, dividend policy and profitability affect the value of the company. Partially, capital structure and profitability have an effect on company value, while dividend policy and GCG do not influence to company value..
This research demonstrates the revealing of an advanced encryption standard (AES) encryption device key. The encryption device is applied to an ATMEGA328P microcontroller. The said microcontroller is a device commonly used in internet of things (IoT). We measured power consumption when the encryption process is taking place. The message sent to the encryption device is randomly generated, but the key used has a fixed value. The novelty of this research is the creation of a systematic and optimal circuit in carrying the differential power analysis or difference of means (DPA/DoM) technique, so the technique can be applied in key revealing on a microcontroller device by using 500 traces in 120 seconds.
We created Mini PGP application which has the function as encryption/description and digital signatures. The other functions of PGP had been removed in the pursuit of facilitating everybody in checking its security. Asymmetry algorithm utilizes the RSA 4096 bit only while symmetry algorithm utilizes Twofish only. We use SHA256 as hash function. This paper shows the security analysis of mini PGP. Comprehensive analysis on PGP conventional version of Windows is highly complex due to very large amount of source code. The goodness of mini PGP is more secured against dictionary attack and spyware if compared with the conventional one. Some PGP for Windows has also the program code that is able to tap the keyboard typing.
Abstract. Cryptography is a very important aspect in data security. The focus of research in this field is shifting from merely security aspect to consider as well the implementation aspect. This paper aims to introduce BC3 algorithm with focus on its hardware implementation. It proposes an architecture for the hardware implementation for this algorithm. BC3 algorithm is a secret-key cryptography algorithm developed with two considerations: robustness and implementation efficiency. This algorithm has been implemented on software and has good performance compared to AES algorithm. BC3 is improvement of BC2 and AE cryptographic algorithm and it is expected to have the same level of robustness and to gain competitive advantages in the implementation aspect. The development of the architecture gives much attention on (1) resource sharing and (2) having single clock for each round. It exploits regularity of the algorithm. This architecture is then implemented on an FPGA. This implementation is three times smaller area than AES, but about five times faster. Furthermore, this BC3 hardware implementation has better performance compared to BC3 software both in key expansion stage and randomizing stage. For the future, the security of this implementation must be reviewed especially against side channel attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with đź’™ for researchers
Part of the Research Solutions Family.