Pengambilan Keputusan, Sikap dan Hubungan antara Karakteristik dengan Sikap Konsumen Minuman Kopi Benefit Coffee Kota Bandar Lampung [PDF]
This consumer behavior research aims to determine decision making, attitudes and the relationship between characteristics and attitudes of coffee beverage consumers at Benefit Coffee (BC) using the survey method and involving 68 respondents.
Adawiyah, Rabiatul +2 more
core +1 more source
A Note on 5-bit Quadratic Permutations’ Classification [PDF]
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms.
Begül Bilgin +2 more
core +2 more sources
ANALYSIS OF MARKETING STRATEGY IN AN EFFORT TO ATTRACT CONSUMER BUYING INTEREST ON MSME PEYEK SARI MENIR GUNUNG KIDUL [PDF]
Marketing strategy has an important role for Micro, Small and Medium Enterprises (MSMEs). The important role of the right marketing strategy will be able to attract consumers to buy the products.
Bintari, Wulan Probo +2 more
core +1 more source
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices [PDF]
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working within the constraints of a low buffer size: Releasing unverified plaintext (RUP) or Producing intermediate tags (PIT).
Donghoon Chang +2 more
core
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates [PDF]
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time. Due to the emergence of security at the edge of computing fabric,
Anupam Chattopadhyay +4 more
core
Under Pressure: Security of Caesar Candidates beyond their Guarantees [PDF]
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as its official goal to ``identify a portfolio of authenticated ciphers that offer advantages over AES-GCM and are suitable for widespread adoption.\u27\u27
Damian Vizár, Serge Vaudenay
core
Reforgeability of Authenticated Encryption Schemes [PDF]
This work pursues the idea of multi-forgery attacks as introduced by Ferguson in 2002. We recoin reforgeability for the complexity of obtaining further forgeries once a first forgery has succeeded. First, we introduce a security notion for the integrity (
Christian Forler +3 more
core
On the division property of S-boxes [PDF]
In 2015, Todo introduced a property of multisets of a finite field called the division property. It is then used by Todo in an attack against the S7 S-box of the MISTY1 cipher. This paper provides a complete mathematical analysis of the division property.
Faruk Göloğlu +2 more
core
PENINGKATAN DONASI DENGAN STRATEGI PEMASARAN DIGITAL PEDULISEHAT.ID MENGGUNAKAN FRAMEWORK CRISP-DM [PDF]
Pedulisehat.id is forum that offers services in the form of online, real-time, and transparent fundraising to collecting various donations from the public to help patients with chronic diseases and need funds for the treatment process.
Basuki, Carola +3 more
core +2 more sources
SIKAP DAN KEPUASAN KONSUMEN DALAM MENGONSUMSI JAMU KUNYIT ASAM INSTAN SEBAGAI MINUMAN KESEHATAN DI KOTA BANDAR LAMPUNG [PDF]
The purposes of this study were to analyze the decision-making process and consumer attitudes, to observe consumption patterns and to measure the level of consumer satisfaction of Sido Muncul and Herbadrink instant sour turmeric herbs in Bandar Lampung ...
Afifah, Shofy Aulia +2 more
core +1 more source

