Implementasi dan Analisis Kriptografi Hybrid Algoritma FEAL dan Algoritma ElGamal Dalam Pengamanan File Teks
DAFTAR PUSTAKA
[1]
Bofandra. 2009. Implementasi Data Encryption Standart untuk Enkripsi –
Dekripsi Berkas PDF. Makalah. Bandung: Institut Teknologi Bandung.
[2]
Fitri, S. 2009. Implementasi Algoritma Kriptografi ElGamal dan WATERMARK
dengan Metode LSB Pada Citra. Skripsi. Yogyakarta: Sekolah Tinggi
manajemen Informatika Dan Komputer.
[3]
T, Semuil, Wijaya, M. C. 2009. Pengamanan Data menggunakan Metoda
Enkripsi Simetri dengan Algoritma FEAL. Jurnal. Bandung: Universitas
Kristen Maranatha.
[4]
Prasetiyo, B. 2013. Kombinasi Steganografi Bit Matching dan Kriptografi
ElGamal untuk Pengamanan Data . Tesis. Semarang: Universitas
Diponegoro.
[5]
Mollin, R. A. 2002. RSA and PublicKey Cryptography. Florida: Chapman &
Hall/CRC.
[6]
Mollin, R. A. 2007. An Introduction to Cryptography. Edisi ke-2. Florida:
Chapman & Hall/CRC.
[7]
Mollin, R. A. 2008. Fundamental Number Theory with Applications. Edisi ke-2.
Florida: Chapman & Hall/CRC.
[8]
Munir, Rinaldi. 2006. Kriptografi. Bandung: Penerbit Informatika.
[9]
Paar, Christof dan Pelzl, Jan. 2010. Understanding Cryptography. Berlin:
Springer-Verlag.
[10] Schneier, Bruce. 1996. Applied Cryptography. Edisi ke-2. New Jersey: John
Wiley & Sons, Inc.
[11] Schneier, Bruce. 1996. Applied Cryptography: Protocols, Algorithms, and
Source Code in C. Edisi ke-2. New Jersey: John Wiley & Sons, Inc.
[12] Sudarmono. 2016. Aplikasi Algoritma ElGamal dan Cryptanalis menggunakan
teori Probabilitas Pada Kartu ATM. Skripsi. Skripsi: Universitas
Sebelas Maret.
[13] Zaki S. 2011. Program Aplikasi Kemanan Citra Dengan Algoritma ElGamal
dan Tranformasi Wavelet Diskrit. Tesis. Semarang: Universitas
Diponegoro.
[14] Kak, A. 2015. Blok Cipher and Data Encription Standart. Lecture Notes. India:
Purdue University.
[15] Knine, L.L. 2009. A new Variant of FEAL Strem Cipher. Journal: Engineering
And Technology.
[16] Dawson, E. Gustafson, H. Henricksen, M. Millian, B. 2002. Evaluation of FEAL
Stream Cipher. Australia, Queensland University of Technology.
[17] Menezes, Oorcshot, and Vanstone, 1996, Handbook of Applied Cryptography,
CRC Press, Inc. USA.
[18] Bilham E, Carmeli Y, 2014, An Improvement of Linear Cryptanalysis with
Addition Operation with Applications To FEAL-8X, Computer Science
Department – Israel Institute of Technology, Israel.
[19] Biswas S, Chellappa, 2011, Face Recognition from Still Images dan Video,
Department of Electrical and Computer Enginering – University of
Maryland – Colledge Park, USA.
[1]
Bofandra. 2009. Implementasi Data Encryption Standart untuk Enkripsi –
Dekripsi Berkas PDF. Makalah. Bandung: Institut Teknologi Bandung.
[2]
Fitri, S. 2009. Implementasi Algoritma Kriptografi ElGamal dan WATERMARK
dengan Metode LSB Pada Citra. Skripsi. Yogyakarta: Sekolah Tinggi
manajemen Informatika Dan Komputer.
[3]
T, Semuil, Wijaya, M. C. 2009. Pengamanan Data menggunakan Metoda
Enkripsi Simetri dengan Algoritma FEAL. Jurnal. Bandung: Universitas
Kristen Maranatha.
[4]
Prasetiyo, B. 2013. Kombinasi Steganografi Bit Matching dan Kriptografi
ElGamal untuk Pengamanan Data . Tesis. Semarang: Universitas
Diponegoro.
[5]
Mollin, R. A. 2002. RSA and PublicKey Cryptography. Florida: Chapman &
Hall/CRC.
[6]
Mollin, R. A. 2007. An Introduction to Cryptography. Edisi ke-2. Florida:
Chapman & Hall/CRC.
[7]
Mollin, R. A. 2008. Fundamental Number Theory with Applications. Edisi ke-2.
Florida: Chapman & Hall/CRC.
[8]
Munir, Rinaldi. 2006. Kriptografi. Bandung: Penerbit Informatika.
[9]
Paar, Christof dan Pelzl, Jan. 2010. Understanding Cryptography. Berlin:
Springer-Verlag.
[10] Schneier, Bruce. 1996. Applied Cryptography. Edisi ke-2. New Jersey: John
Wiley & Sons, Inc.
[11] Schneier, Bruce. 1996. Applied Cryptography: Protocols, Algorithms, and
Source Code in C. Edisi ke-2. New Jersey: John Wiley & Sons, Inc.
[12] Sudarmono. 2016. Aplikasi Algoritma ElGamal dan Cryptanalis menggunakan
teori Probabilitas Pada Kartu ATM. Skripsi. Skripsi: Universitas
Sebelas Maret.
[13] Zaki S. 2011. Program Aplikasi Kemanan Citra Dengan Algoritma ElGamal
dan Tranformasi Wavelet Diskrit. Tesis. Semarang: Universitas
Diponegoro.
[14] Kak, A. 2015. Blok Cipher and Data Encription Standart. Lecture Notes. India:
Purdue University.
[15] Knine, L.L. 2009. A new Variant of FEAL Strem Cipher. Journal: Engineering
And Technology.
[16] Dawson, E. Gustafson, H. Henricksen, M. Millian, B. 2002. Evaluation of FEAL
Stream Cipher. Australia, Queensland University of Technology.
[17] Menezes, Oorcshot, and Vanstone, 1996, Handbook of Applied Cryptography,
CRC Press, Inc. USA.
[18] Bilham E, Carmeli Y, 2014, An Improvement of Linear Cryptanalysis with
Addition Operation with Applications To FEAL-8X, Computer Science
Department – Israel Institute of Technology, Israel.
[19] Biswas S, Chellappa, 2011, Face Recognition from Still Images dan Video,
Department of Electrical and Computer Enginering – University of
Maryland – Colledge Park, USA.