Optimasi Kunci Dengan Blum Blum Shub Pada Algoritma RC4
DAFTAR PUSTAKA
Chehal, R., & Singh, K. (2012). Efficiency and Security of Data with symmetric
Encryption Algorithms. International Journal of advanced research in
Computer Science and Software Engineering , 472-475.
Giradkar, S.S, & Bhattacharya, A. (2015). Securing Compresses Video Streams Using
RC4 Encryption Schme. proceedings of 2015 Global conference on
Communication Technologies (GCCT 2015), 640-644.
Haupt, R L., & Haupt, S E. (2004). Practical Genetic Algorithm.
Junod, P. (1999). Cryptography Secure Pseodorandom Bits generation: The Blum
Blum Shub Generator. August.
Menezez, A. J., Paul, C. V., & Scoot, A. V. (1996). Handbook of Applied
Cyrptography. CRC Press: Boca Raton.
Mollin, R. A. (2005). The Guide to Secrecy from Ancient to Modern Times. Taylor &
Francis Group is the Academic Division of T & F Informa plc.
Mousa, A., & Hamad, A. (Vol.3, No. 2, June 2006). Evaluation of the RC4 Algorithm
for Data Encryption. Internasional Journal of Computer Science & Applicatios ,
44-56.
Mulya, M. (2013). Perbandingan Kecepatan Algoritma Kriptografi Asimetris. Journa l
Resear ch Computer Science & Application , Vol 2, 7-12.
Sadikin, R. (2012). Kr iptografi untuk keamanan jaringan. Yogyakarta: Andi.
Sanjaya, B. M., & Telnoni, A. P. (2015). Implementasi Blum-blum-shub dan Chaotic
Function untuk modifikasi key generating pada AES. Jurna l Elektro
Telekomunikasi Terapan , 154-165.
Schneier, B. (1996). Applied Cryptography. John Wiley and Sons Inc.
Sidorenko, A., & Schoenmakers, B. (2005). Concrete Security of the Blum- BlumShub Psedorandom Generator. 10th IMA Internasional Conference, Lecture
Notes in Computer Science 3796 , 355-375.
Stinson, D. (1995). Cryptography: Theory and Practice. Florida: CRC Press,Inc.
Weerasinghe, T. D. (2013). An Effective RC4 Stream Cipher. International
Conference on Industrial and Information Systems (ICIIS) , 69-74.
Xie, J., & Pan, X. (2010). An Improved RC4 Stream Cipher. International Conference
on Computer Application and System Modeling (ICCASAM) , v7-156-159.
Universitas Sumatera Utara
LAMPIRAN :
DAFTAR PUBLIKASI ILMIAH PENULIS
NO
1.
Judul Artikel
Peranan Proxy Dalam
Keamanan Jaringan
Internet
2.
Perbandingan Sistem
Operasi Android
Kitkat Dengan
Android Lollipop
3.
Analisis Sistem
Penyimpanan Data
Berbasis Cloud
Computing Studi
Kasus Kanwil
Kementerian Agama
Provinsi Sumatera
Utara
Penulis
Chaeroen Niesa
Chaeroen Niesa,
Niti Ravika
Nasution
Niti Ravika
Nasution,
Chaeroen Niesa
Publikasi
(SeminarTahun
Tempat
Jurnal)
Prosiding
Seminar
Nasional
UNIVERSITAS
Literasi
SUMATERA
2014
Informasi
UTARA, Medan
(SENARAI), 01
Desember. Hal :
169-171.
Prosiding
Seminar Sehari
UNIVERSITAS
Pascasarjana
2015
SUMATERA
Informatika,
UTARA, Medan
SENOPATI, 30
Oktober
Prosiding
Seminar Sehari
Pascasarjana
Informatika,
SENOPATI, 30
Oktober
2015
UNIVERSITAS
SUMATERA
UTARA, Medan
2016
MEDAN,
INDONESIA
PROCEEDING
4.
The Role Of
Cryptography Of
Vigenere Cipher In
Information Security
Chaeroen Niesa
International
Conference of
Computer,
Environment,
Social Science,
Engineering and
Technology
(ICEST), 23-25
Mei. Hal: 134140
Universitas Sumatera Utara
Chehal, R., & Singh, K. (2012). Efficiency and Security of Data with symmetric
Encryption Algorithms. International Journal of advanced research in
Computer Science and Software Engineering , 472-475.
Giradkar, S.S, & Bhattacharya, A. (2015). Securing Compresses Video Streams Using
RC4 Encryption Schme. proceedings of 2015 Global conference on
Communication Technologies (GCCT 2015), 640-644.
Haupt, R L., & Haupt, S E. (2004). Practical Genetic Algorithm.
Junod, P. (1999). Cryptography Secure Pseodorandom Bits generation: The Blum
Blum Shub Generator. August.
Menezez, A. J., Paul, C. V., & Scoot, A. V. (1996). Handbook of Applied
Cyrptography. CRC Press: Boca Raton.
Mollin, R. A. (2005). The Guide to Secrecy from Ancient to Modern Times. Taylor &
Francis Group is the Academic Division of T & F Informa plc.
Mousa, A., & Hamad, A. (Vol.3, No. 2, June 2006). Evaluation of the RC4 Algorithm
for Data Encryption. Internasional Journal of Computer Science & Applicatios ,
44-56.
Mulya, M. (2013). Perbandingan Kecepatan Algoritma Kriptografi Asimetris. Journa l
Resear ch Computer Science & Application , Vol 2, 7-12.
Sadikin, R. (2012). Kr iptografi untuk keamanan jaringan. Yogyakarta: Andi.
Sanjaya, B. M., & Telnoni, A. P. (2015). Implementasi Blum-blum-shub dan Chaotic
Function untuk modifikasi key generating pada AES. Jurna l Elektro
Telekomunikasi Terapan , 154-165.
Schneier, B. (1996). Applied Cryptography. John Wiley and Sons Inc.
Sidorenko, A., & Schoenmakers, B. (2005). Concrete Security of the Blum- BlumShub Psedorandom Generator. 10th IMA Internasional Conference, Lecture
Notes in Computer Science 3796 , 355-375.
Stinson, D. (1995). Cryptography: Theory and Practice. Florida: CRC Press,Inc.
Weerasinghe, T. D. (2013). An Effective RC4 Stream Cipher. International
Conference on Industrial and Information Systems (ICIIS) , 69-74.
Xie, J., & Pan, X. (2010). An Improved RC4 Stream Cipher. International Conference
on Computer Application and System Modeling (ICCASAM) , v7-156-159.
Universitas Sumatera Utara
LAMPIRAN :
DAFTAR PUBLIKASI ILMIAH PENULIS
NO
1.
Judul Artikel
Peranan Proxy Dalam
Keamanan Jaringan
Internet
2.
Perbandingan Sistem
Operasi Android
Kitkat Dengan
Android Lollipop
3.
Analisis Sistem
Penyimpanan Data
Berbasis Cloud
Computing Studi
Kasus Kanwil
Kementerian Agama
Provinsi Sumatera
Utara
Penulis
Chaeroen Niesa
Chaeroen Niesa,
Niti Ravika
Nasution
Niti Ravika
Nasution,
Chaeroen Niesa
Publikasi
(SeminarTahun
Tempat
Jurnal)
Prosiding
Seminar
Nasional
UNIVERSITAS
Literasi
SUMATERA
2014
Informasi
UTARA, Medan
(SENARAI), 01
Desember. Hal :
169-171.
Prosiding
Seminar Sehari
UNIVERSITAS
Pascasarjana
2015
SUMATERA
Informatika,
UTARA, Medan
SENOPATI, 30
Oktober
Prosiding
Seminar Sehari
Pascasarjana
Informatika,
SENOPATI, 30
Oktober
2015
UNIVERSITAS
SUMATERA
UTARA, Medan
2016
MEDAN,
INDONESIA
PROCEEDING
4.
The Role Of
Cryptography Of
Vigenere Cipher In
Information Security
Chaeroen Niesa
International
Conference of
Computer,
Environment,
Social Science,
Engineering and
Technology
(ICEST), 23-25
Mei. Hal: 134140
Universitas Sumatera Utara