IMPLEMENTASI ALGORITMA KRIPTOGRAFI RSA DAN RABIN PADA THREE-PASS PROTOCOL UNTUK PENGAMANAN DATA PADA APLIKASI CHAT BERBASIS ANDROID
Daftar Pustaka
Bellare, M. & Rogaway, P. 2005. Introduction to Modern Cryptography. California.
Galbraith, Steven D. 2012. Mathematics Of Public Key Cryptography. Cambridge
University Press: New York.
Haramaini, T. 2014. Algoritma One Time Pad pada Three Pass Protocol. Tesis.
Universitas Sumatera Utara.
Kasmaji, Aji Nugraha Santosa, 2014. Implementasi Algoritma RSA dan Three-Pass
Protocol pada Sistem Pertukaran Pesan Rahasia. Jurnal Institut Teknologi
Bandung.
Möhring, Rolf H. dan Oellrich, Martin. 2011. The Sieve of Eratosthenes – How Fast Can
We Compute a Prime Number Table. Algorithms Unplugged, hal 116-130.
Berlin Heidelberg, Jerman: Springer-Verlag.
Mollin, Richard A. 2003. RSA and Pulic-Key Cryptography: Discrete Mathematics and
Its Applications.Taylor & Francis Group: New York.
Mollin, Richard A. 2007. An Introduction to Cryptography: Discrete Mathematics and Its
Applications. Taylor & Francis Group: New York.
Mollin, Richard A. 2007. An Introduction to Cryptography Second Edition. Taylor &
Francis Group: New York.
Munir, R. 2011. Kriptografi. Informatika: Bandung.
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C.
2nd Edition. New York.
Stallings, William. 2005. Cryptography and Network Security Principles and Practices
4th Ed. USA: Prentice Hall.
Sujiono, Dina Meiladya Rizki. 2016. Implementasi Three-Pass Protocol dengan
Kombinasi Algoritma Beaufort Cipher dan One Time Pad untuk
Pengamanan Data. Skripsi. Universitas Sumatera Utara
Bellare, M. & Rogaway, P. 2005. Introduction to Modern Cryptography. California.
Galbraith, Steven D. 2012. Mathematics Of Public Key Cryptography. Cambridge
University Press: New York.
Haramaini, T. 2014. Algoritma One Time Pad pada Three Pass Protocol. Tesis.
Universitas Sumatera Utara.
Kasmaji, Aji Nugraha Santosa, 2014. Implementasi Algoritma RSA dan Three-Pass
Protocol pada Sistem Pertukaran Pesan Rahasia. Jurnal Institut Teknologi
Bandung.
Möhring, Rolf H. dan Oellrich, Martin. 2011. The Sieve of Eratosthenes – How Fast Can
We Compute a Prime Number Table. Algorithms Unplugged, hal 116-130.
Berlin Heidelberg, Jerman: Springer-Verlag.
Mollin, Richard A. 2003. RSA and Pulic-Key Cryptography: Discrete Mathematics and
Its Applications.Taylor & Francis Group: New York.
Mollin, Richard A. 2007. An Introduction to Cryptography: Discrete Mathematics and Its
Applications. Taylor & Francis Group: New York.
Mollin, Richard A. 2007. An Introduction to Cryptography Second Edition. Taylor &
Francis Group: New York.
Munir, R. 2011. Kriptografi. Informatika: Bandung.
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C.
2nd Edition. New York.
Stallings, William. 2005. Cryptography and Network Security Principles and Practices
4th Ed. USA: Prentice Hall.
Sujiono, Dina Meiladya Rizki. 2016. Implementasi Three-Pass Protocol dengan
Kombinasi Algoritma Beaufort Cipher dan One Time Pad untuk
Pengamanan Data. Skripsi. Universitas Sumatera Utara