Analisis Kombinasi Algoritma One Time Pad Dan Algoritma Elgamal Dalam Pengamanan Pesan
55
DAFTAR PUSTAKA
Ariyus, Dony. 2006. Computer Security. Penerbit Andi:Yogyakarta.
Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi : Teori, Analisis dan Implementasi
Penerbit Andi:Yogyakarta.
Caroline, Maureen Linda. 2011. Perbandingan Algoritma Kriptografi Kunci Publik
RSA, Rabin, dan ElGamal. Makalah IF3058 Kriptografi.
Dooley, John F. 2013. A Brief History of Cryptology and Cryptographic
Algorithms.Springer-Verlag Berlin Heidelberg: New York.
Goyal, Kashish.& Kinger, Supriya. 2013. Modified Caesar Cipher for Better Security
Enhancement.International Journal of Computer Applications73(3): 0975 –
8887.
Horstmeyer, Roarke., Judkewitz, Benjamin., Vellekoop, Ivo M., Assawawarrarit, Sid.
& Yang, Changhuei. 2013. Physical key-protected one-time pad. Scientific
Reports3.
Kumar, Sohit. & Vashistha, Ashish. 2013. Using El Gamal Cryptosystem in Message
Feedback Mode for Computing Cost Reduction. International Journal of
Computer Applications74(19): 023-027.
Kromodimoeljo, Sentot. 2009. Teori dan Aplikasi Kriptografi. SPK IT Consulting:
Indonesia.
Mollin, Richard A.. 2007. An Introduction to Cryptography. 2nd Edition. Taylor &
Francis Group:Boca Raton.
Munir, Rinaldi. 2006. Kriptografi. Penerbit Informatika:Bandung.
Universitas Sumatera Utara
56
Nemati, Hamid R. & Yang, Li. 2011. Applied Cryptography for Cyber Security and
Defense: Information Encryption and Cyphering. Informatic Science
Reference:New York.
Paar, Christof. & Pelzl, Jan. 2010.Understanding Cryptography : A Textbook for
Students and Practitioners. Springer-Verlag Berlin Heidelberg: New York.
Sadikin, Rifki. 2012.Kriptografi untuk keamanan jaringan.
CV Andi Offset:
Yogyakarta
Schneier, Bruce., 1996, Applied Cryptography : Protocols, Algorithms, and Source
Code in C, 2nd Edition JohnWiley & Sons Inc
Sharma, Shachi & Vinti, Gupta. 2013. Encryption and Decryption Using One Time
Pad in Mac Layer. International Journal of Inovative Research in Science,
Enginering and Technology (IJIRSET)2(6): 2248-2250
Srikantaswamy, S.G. & Phaneendra, Dr. H.D.. 2011. Enchanced One Time Pad
Cipher with More Arithmetic and Logical Operations with Flexible Key
Generation Algorithm. International Journal of Network Security & Its
Application (IJNSA)3(6): 243-248.
Stamp, Mark., 2011. Information Security, 2nd Edition. JohnWiley & Sons Inc
Universitas Sumatera Utara
DAFTAR PUSTAKA
Ariyus, Dony. 2006. Computer Security. Penerbit Andi:Yogyakarta.
Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi : Teori, Analisis dan Implementasi
Penerbit Andi:Yogyakarta.
Caroline, Maureen Linda. 2011. Perbandingan Algoritma Kriptografi Kunci Publik
RSA, Rabin, dan ElGamal. Makalah IF3058 Kriptografi.
Dooley, John F. 2013. A Brief History of Cryptology and Cryptographic
Algorithms.Springer-Verlag Berlin Heidelberg: New York.
Goyal, Kashish.& Kinger, Supriya. 2013. Modified Caesar Cipher for Better Security
Enhancement.International Journal of Computer Applications73(3): 0975 –
8887.
Horstmeyer, Roarke., Judkewitz, Benjamin., Vellekoop, Ivo M., Assawawarrarit, Sid.
& Yang, Changhuei. 2013. Physical key-protected one-time pad. Scientific
Reports3.
Kumar, Sohit. & Vashistha, Ashish. 2013. Using El Gamal Cryptosystem in Message
Feedback Mode for Computing Cost Reduction. International Journal of
Computer Applications74(19): 023-027.
Kromodimoeljo, Sentot. 2009. Teori dan Aplikasi Kriptografi. SPK IT Consulting:
Indonesia.
Mollin, Richard A.. 2007. An Introduction to Cryptography. 2nd Edition. Taylor &
Francis Group:Boca Raton.
Munir, Rinaldi. 2006. Kriptografi. Penerbit Informatika:Bandung.
Universitas Sumatera Utara
56
Nemati, Hamid R. & Yang, Li. 2011. Applied Cryptography for Cyber Security and
Defense: Information Encryption and Cyphering. Informatic Science
Reference:New York.
Paar, Christof. & Pelzl, Jan. 2010.Understanding Cryptography : A Textbook for
Students and Practitioners. Springer-Verlag Berlin Heidelberg: New York.
Sadikin, Rifki. 2012.Kriptografi untuk keamanan jaringan.
CV Andi Offset:
Yogyakarta
Schneier, Bruce., 1996, Applied Cryptography : Protocols, Algorithms, and Source
Code in C, 2nd Edition JohnWiley & Sons Inc
Sharma, Shachi & Vinti, Gupta. 2013. Encryption and Decryption Using One Time
Pad in Mac Layer. International Journal of Inovative Research in Science,
Enginering and Technology (IJIRSET)2(6): 2248-2250
Srikantaswamy, S.G. & Phaneendra, Dr. H.D.. 2011. Enchanced One Time Pad
Cipher with More Arithmetic and Logical Operations with Flexible Key
Generation Algorithm. International Journal of Network Security & Its
Application (IJNSA)3(6): 243-248.
Stamp, Mark., 2011. Information Security, 2nd Edition. JohnWiley & Sons Inc
Universitas Sumatera Utara