Analisis Keamanan Pada Kombinasi Protokol Secret Sharing Dan Three-Pass

59

DAFTAR PUSTAKA

Abdalla, M., Catalano, D., Chevalier, C., & Pointcheval, D. 2008. Efficient two-party
password-based key exchange protocols in the UC framework. CT-RSA 2008.
LNCS, vol 4964 (pp. 335-351). Heidelberg: Springer.
Cormen, T. H., Leiserson, C. E., & Rivest, R. L. 2009. Introduction to Algorithm, 3rd
Edition. Cambridge, Massachusetts: The MIT Press.
Hu, C., Liao, X., & Cheng, X. 2012. Verifiable Multi-Secret Sharing Based on LSFR.
Theoretical Computer Science 445 (pp. 52-62). Elsevier B.V.
Iften, S. 2007. Secret Sharing Schemes With Applications in Security Protocols. Ph.D.
Thesis. University of Iasi.
Kahn, D. 1967. The Codebreakers – The Story of Secret Writing. New York:
Macmillan Publishers Ltd.
Knuth, D. E. 1997. The Art of Computer Programming, Volume 2: Seminumerical
Algorithms, Third Edition. Addison-Wesley.
Muhil, M., Krishna, U. H., Kumar, R. K., & Anita, E. A. 2015. Securing Multi-Cloud
using Secret Sharing Algorithm. 2nd International Symposium on Big Data
and Cloud Computing (pp. 421-426). Elsevier B. V.
Rahardjo, B. 2005. Keamanan Informasi Berbasis Internet. Bandung: PT Insan

Infonesia.
Schneier, B. 1996. Applied Cryptography, Second Edition: Protocols, Algorithms, and
Source Code in C (Vol. II). California: John Wiley & Sons, Inc.
Severance, F. 2001. System Modeling and Simulation. John Wiley & Sons, Ltd.
Shamir, A. 1979. How to share a secret. Communication of The ACM (Vol. 22, issue
11), 612-613.
Shannon, C. 1949. Communication theory of secrecy systems. Bell System Technical
Journal (Vol. 28, Issue 4), 656 - 715.
Stallings, W. 2011. Cryptography and Network Security (Vol. V). New York: Prentice
Hall.
Tartary, C., & Wang, H. 2006. Dynamic Threshold and Cheater Resistance for Shamir
Secret Sharing Scheme. H. Lipmaa, M. Yung, and D. Lin (Eds.): Inscrypt
2006, LNCS 4318 (pp. 103-117). Verlag Berlin Heidelberg: Springer.
Uchôa, A. G., Pellenz, M. E., Santin, A. O., & Maziero, C. A. 2007. A Three-Pass
Protocol for Cryptography Based on Padding for Wireless Networks. IEEE
Consumer Communications and Networking Conference (pp. 1-5). IEEE
Communications Society.

Universitas Sumatera Utara