S KOM 1200458 Bibliography

DAFTAR PUSTAKA

Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards.
International Journal of Security and its aplications, 241-246.
Amish Kumar, M. N. (2012). EFFECTIVE IMPLEMENTATION AND
AVALANCHE EFFECT OF AES . International Journal of Security,
Privacy and Trust Management ( IJSPTM), Vol. 1, No 3/4, 31-35.
bobsusanto. (2015, agustus 13). http://www.seputarpengetahuan.com/2015/08.
Retrieved from http://www.seputarpengetahuan.com/:
http://www.seputarpengetahuan.com/2015/08/5-pengertian-file-menurutpara-ahli-lengkap.html
Huda, M. (2009). Perkembangan Enkripsi Fungsi Hash pada SHA (Secure Hash
Algorithm). Bandung: Sekolah Teknik Elektro dan Informatika Institut
Teknologi Bandung.
komputer, I. (2012, November 19).
http://www.infokomputer.com/2012/11/berita/keluhan-5-layanan-cloudstorage/. Retrieved from http://www.infokomputer.com/:
http://www.infokomputer.com/2012/11/berita/keluhan-5-layanan-cloudstorage/
Kovacs, E. (2015, agustus 5). https://www.h11dfs.com/man-in-the-cloud-attack/.
Retrieved from https://www.h11dfs.com/man-in-the-cloud-attack/:
https://www.h11dfs.com/man-in-the-cloud-attack/
Krishnamurthy, G., & Ramaswamy, D. (2008). Making AES Stronger: AES with
Key Dependent S-Box. International Journal of Computer Science and

Network Security, Vol.8 No.9, 388-398.
Kromodimoeljo, S. (2009). Teori dan Aplikasi Kriptorafi . SPK IT Consulting.
Mahajan, D. P., & Sachdeva, A. (2013). A STUDY OF ENCRYPTION
ALGORITHMS AES, DES AND RSA FOR SECURITY. Global Journal
of Computer Science and Technology Network and Web Security, 15-21.
Mandal, A. K., & Tiwari, A. T. (2012). Analysis of Avalanche Effect in Plaintext
of DES using Binary Codes. International Journal of Emerging Trends &
Technology in Computer Science, 166-171.
80
Asep Rizal Nurjaman, 2016
MODIFIKASI ALGORITMA DATA ENCRYPTION STANDARD (DES) 64 BIT UNTUK PENGAMANAN
PADA PENYIMPANAN FILE
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu

80
Asep Rizal Nurjaman, 2016
MODIFIKASI ALGORITMA DATA ENCRYPTION STANDARD (DES) 64 BIT UNTUK PENGAMANAN
PADA PENYIMPANAN FILE
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu


81

Menezes, A. J., Oorschot, P. C., & Vanstone, S. A. (1996). HANDBOOK of
APPLIED CRYPTOGRAPHY. Boca Raton: Massachusetts Institute of
Technology.
Munir, R. (2004). Data Encryption Standard (DES). Bandung: Departemen
Teknik Informatika Institut Teknologi Bandung.
Mushtaque, M. A., & Dhiman, H. (2014). Evaluation of DES, TDES, AES,
Blowfish and Two fish Encryption Algorithm: Based on Space
Complexity. International Journal of Engineering Research & Technology
(IJERT), 283-286.
Primartha, R. (2011). Penerapan Enkripsi dan Dekripsi File Menggunakan
Algoritma Data Encryption Standard(DES). Jurnal Sistem Informasi, 371387.
Prof.N..Penchalaiah, & Dr.R.Seshadri. (2010). Effective Comparison and
Evaluation of DES and Rijndael Algorithm (AES). (IJCSE) International
Journal on Computer Science and Engineering, 1641-1645.
Rahardjo, B. (2005). Keamanan Sistem Informasi Berbasis Internet. Bandung: PT
Insan Infonesia .
Sadikin, R. (2012). Kriptografi untuk Keamanan Jaringan. Yogyakarta: Andi.
Sommerville, I. (2011). Software Enginering 9th Edition. Pearson.

Sonjaya, I. (2007). Uji Homogenitas Data Iklim Di Statsiun Klimatologi
Banjarbaru. Banjarbaru: Stasiun Klimatologi Banjarbaru.
Sriram Ramanujam, M. K. (2011). Designing an algorithm with high Avalanche
Effect. IJCSNS International Journal of Computer Science and Network
Security, VOL.11 No.1, 106-111.
Stallings, W. (2011). Cryptography and Network Security Principles and
Practice. USA,1 Lake Street: Upper Saddle, NY 07458.

Asep Rizal Nurjaman, 2016
MODIFIKASI ALGORITMA DATA ENCRYPTION STANDARD (DES) 64 BIT UNTUK PENGAMANAN
PADA PENYIMPANAN FILE
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu