Optimasi Kunci Dengan Blum Blum Shub Pada Algoritma RC4

DAFTAR PUSTAKA

Chehal, R., & Singh, K. (2012). Efficiency and Security of Data with symmetric
Encryption Algorithms. International Journal of advanced research in
Computer Science and Software Engineering , 472-475.
Giradkar, S.S, & Bhattacharya, A. (2015). Securing Compresses Video Streams Using
RC4 Encryption Schme. proceedings of 2015 Global conference on
Communication Technologies (GCCT 2015), 640-644.
Haupt, R L., & Haupt, S E. (2004). Practical Genetic Algorithm.
Junod, P. (1999). Cryptography Secure Pseodorandom Bits generation: The Blum
Blum Shub Generator. August.
Menezez, A. J., Paul, C. V., & Scoot, A. V. (1996). Handbook of Applied
Cyrptography. CRC Press: Boca Raton.
Mollin, R. A. (2005). The Guide to Secrecy from Ancient to Modern Times. Taylor &
Francis Group is the Academic Division of T & F Informa plc.
Mousa, A., & Hamad, A. (Vol.3, No. 2, June 2006). Evaluation of the RC4 Algorithm
for Data Encryption. Internasional Journal of Computer Science & Applicatios ,
44-56.
Mulya, M. (2013). Perbandingan Kecepatan Algoritma Kriptografi Asimetris. Journa l
Resear ch Computer Science & Application , Vol 2, 7-12.
Sadikin, R. (2012). Kr iptografi untuk keamanan jaringan. Yogyakarta: Andi.

Sanjaya, B. M., & Telnoni, A. P. (2015). Implementasi Blum-blum-shub dan Chaotic
Function untuk modifikasi key generating pada AES. Jurna l Elektro
Telekomunikasi Terapan , 154-165.
Schneier, B. (1996). Applied Cryptography. John Wiley and Sons Inc.
Sidorenko, A., & Schoenmakers, B. (2005). Concrete Security of the Blum- BlumShub Psedorandom Generator. 10th IMA Internasional Conference, Lecture
Notes in Computer Science 3796 , 355-375.
Stinson, D. (1995). Cryptography: Theory and Practice. Florida: CRC Press,Inc.
Weerasinghe, T. D. (2013). An Effective RC4 Stream Cipher. International
Conference on Industrial and Information Systems (ICIIS) , 69-74.
Xie, J., & Pan, X. (2010). An Improved RC4 Stream Cipher. International Conference
on Computer Application and System Modeling (ICCASAM) , v7-156-159.

Universitas Sumatera Utara

LAMPIRAN :
DAFTAR PUBLIKASI ILMIAH PENULIS

NO

1.


Judul Artikel

Peranan Proxy Dalam
Keamanan Jaringan
Internet

2.

Perbandingan Sistem
Operasi Android
Kitkat Dengan
Android Lollipop

3.

Analisis Sistem
Penyimpanan Data
Berbasis Cloud
Computing Studi

Kasus Kanwil
Kementerian Agama
Provinsi Sumatera
Utara

Penulis

Chaeroen Niesa

Chaeroen Niesa,
Niti Ravika
Nasution

Niti Ravika
Nasution,
Chaeroen Niesa

Publikasi
(SeminarTahun
Tempat

Jurnal)
Prosiding
Seminar
Nasional
UNIVERSITAS
Literasi
SUMATERA
2014
Informasi
UTARA, Medan
(SENARAI), 01
Desember. Hal :
169-171.
Prosiding
Seminar Sehari
UNIVERSITAS
Pascasarjana
2015
SUMATERA
Informatika,

UTARA, Medan
SENOPATI, 30
Oktober

Prosiding
Seminar Sehari
Pascasarjana
Informatika,
SENOPATI, 30
Oktober

2015

UNIVERSITAS
SUMATERA
UTARA, Medan

2016

MEDAN,

INDONESIA

PROCEEDING

4.

The Role Of
Cryptography Of
Vigenere Cipher In
Information Security

Chaeroen Niesa

International
Conference of
Computer,
Environment,
Social Science,
Engineering and
Technology

(ICEST), 23-25
Mei. Hal: 134140

Universitas Sumatera Utara