Pengamanan Teks Dengan Hybrid Cryptosystem Algoritma Multi-Power Rsa Dan Algoritma Blowfish

DAFTAR PUSTAKA

Agrawal, Manindra., Kayal, Neeraj., & Saxena, Nitin. 2002. Primes is in P. Indian
Institute of Technology Kanpur, India.
Ariyus, Doni. 2008. Pengantar ilmu Kriptografi, Teori, analisis dan Implementasi.
Yogyakarta: Penerbit Andi.
Arora, Nikita & Gigras, Yogita. 2014. Block and Stream Cipher Based Cryptographic
Algorithms: A Survey. International Research Publications House 4: 189-196.
Basri. 2016. Kriptografi Simetris dan Asimetris Dalam Perspektif Keamanan Data dan
Kompleksitas Komputasi. Jurnal Ilmiah Ilmu Komputer 2: 17-23.
Bhanot, Rajdeep & Rahul Han. 2015. A Review and Comparative Analysis of
Various Encryption Algorithms. International Journal of Security and Its
Applications 4: 289-306.
Bridgeca.,
1999,
Cryptography
and
Public
Key
http://www.secude.com/bridgeca/crypt_and_ pki_guide_e.pdf.


Infrastructure,

Churchhouse, R. F. 2002. Code and Ciphers: Julius Caesar, the enigma and the
Internet, Cambridge University Press, 2002.
D. Boneh and H. Shacham. Fast variants of RSA. Cryptobytes, 5(1):1–9, 2002.
Fauziah, Yuli. 2008. Pengamanan Pesan dalam Editor teks Menggunakan
Hybridcryptosystem. Seminar Nasional Informatika 2008. 398-407.
Gutub, A. A. A. & Khan, A. A. F. 2012. Hybrid Crypto Hardware Utilizing
Symmetric Key & Public Key Cryptosystems. International Conference on
Advanced Computer Science Applications and Technologies.
Kurnia, Ahda Andi. 2016. Implementasi Algoritma Blowfish Pada Aplikasi Enkripsi
Dan Dekripsi Citra Berbasis Windows. Skripsi. Universitas Sumatera Utara.
Menezes, A. et al. (1996). Handbook of Applied Cryptography. New York: CRC
Press.
Mollin, R. 2007. An Introduction to Cryptography: Discrete Mathematics and Its
Applications. Kenneth H. Rosen. 2nd Edition. Taylor & Francis Group, LLC:
New York.
Munawar. 2012. Perancangan Algoritma Sistem Keamanan Data Menggunakan
Kriptografi Asimetris. Jurnal Komputer dan Informatika Edisi I Volume 1


Universitas Sumatera Utara

Munir, Rinaldi. 2006. Kriptografi. Bandung: Penerbit Informatika.
Oppliger, Rolf. (2005). Contemporary Cryptography. London: Artech House.
Pujianto. 2012. Analisis dan Perancangan Sistem Informasi Penjualan Buku Dengan
Konsinyasi Berbasis Client/Server. Jurnal Informatika 2: 118-127.
Sadikin, Rifki. 2012. Kriptografi Untuk Keamanan Jaringan. Penerbit Andi:
Yogyakarta.
Schneier, Bruce., 1996, Applied Cryptography: Protocols, Algorithms, and Source
Code in C, 2nd Edition John Wiley & Sons Inc.
Vuillaume, Camille. 2002. Efficiency Comparison of Several RSA Variants,
Studienarbeit.
Whitten, Jeffrey L. & Bentley, Lonnie D. 2007. Systems Analysis & Design Methods.
7th Edition. McGraw-Hill/Irwin: New York.

Universitas Sumatera Utara