Implementasi Algoritma Kunci Publikntruencrypt Pada Add-In Microsoft Outlook
90
DAFTAR PUSTAKA
[1]
Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi. Yogyakarta: Penerbit Andi.
[2]
Challa, Narasimham dan Pradhan, Jayaram. 2007. “Performance analysis of
public key cryptographic systems RSA and NTRU”. Dalam International
Journal of Computer Science and Network Security (IJCSNS) 2007: vol 7 hal
87-96.
[3]
Draft Standard Specification for Public-Key Cryptographic Techniques Based
on Hard Problems over Lattices. 2008. IEEE P1363.1™/D12. New York, USA:
Institute of Electrical and Electronics Engineers, Inc.
[4]
Forouzan, A Behrouz. 2008. Cryptography and Network Security. Singapore:
Mc Graw-Hill Education (Asia).
[5]
Hoffstein, J., Pipher, J., Silverman, J. H. 1998. “NTRU: a new high speed public
key cryptosystem”. Dalam Proceedings of Algorithm Number Theory (ANTS
III), LNCS 2008: vol 1423 hal 267–288.
[6]
Munir, Rinaldi. 2008. Belajar Ilmu Kriptografi. Yogyakarta: Penerbit Andi.
[7]
O'Rourke, C. Marie. 2002. Eficient NTRU Implementations. M. IT Thesis.
Massachusetts, USA: Worcester Polytechnic Institute.
[8]
Ranjeet Ranjan, Dr. A. S. Baghel, dan Sushil Kumar. 2012. “Improvement of
NTRU cryptosystem”. Dalam International Journal of Advanced Research in
Computer Science and Software Engineering 2012: vol 2 hal 79-84.
[9]
https://www.securityinnovation.com/security-lab/crypto/102.-ntru-faqs.html.
Diakses pada Selasa, 2 Oktober 2013 pukul 05.01 AM.
[10] http://support.microsoft.com/kb/829918. Diakses pada Selasa, 5 Oktober 2013
pukul 08.46 AM.
[11] http://primes.utm.edu/largest.html#biggest. Diakses pada Rabu, 30 Januari 2013
pukul 12.47 AM.
Universitas Sumatera Utara
DAFTAR PUSTAKA
[1]
Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi. Yogyakarta: Penerbit Andi.
[2]
Challa, Narasimham dan Pradhan, Jayaram. 2007. “Performance analysis of
public key cryptographic systems RSA and NTRU”. Dalam International
Journal of Computer Science and Network Security (IJCSNS) 2007: vol 7 hal
87-96.
[3]
Draft Standard Specification for Public-Key Cryptographic Techniques Based
on Hard Problems over Lattices. 2008. IEEE P1363.1™/D12. New York, USA:
Institute of Electrical and Electronics Engineers, Inc.
[4]
Forouzan, A Behrouz. 2008. Cryptography and Network Security. Singapore:
Mc Graw-Hill Education (Asia).
[5]
Hoffstein, J., Pipher, J., Silverman, J. H. 1998. “NTRU: a new high speed public
key cryptosystem”. Dalam Proceedings of Algorithm Number Theory (ANTS
III), LNCS 2008: vol 1423 hal 267–288.
[6]
Munir, Rinaldi. 2008. Belajar Ilmu Kriptografi. Yogyakarta: Penerbit Andi.
[7]
O'Rourke, C. Marie. 2002. Eficient NTRU Implementations. M. IT Thesis.
Massachusetts, USA: Worcester Polytechnic Institute.
[8]
Ranjeet Ranjan, Dr. A. S. Baghel, dan Sushil Kumar. 2012. “Improvement of
NTRU cryptosystem”. Dalam International Journal of Advanced Research in
Computer Science and Software Engineering 2012: vol 2 hal 79-84.
[9]
https://www.securityinnovation.com/security-lab/crypto/102.-ntru-faqs.html.
Diakses pada Selasa, 2 Oktober 2013 pukul 05.01 AM.
[10] http://support.microsoft.com/kb/829918. Diakses pada Selasa, 5 Oktober 2013
pukul 08.46 AM.
[11] http://primes.utm.edu/largest.html#biggest. Diakses pada Rabu, 30 Januari 2013
pukul 12.47 AM.
Universitas Sumatera Utara