T1 672012224 Daftar Pustaka
Daftar Pustaka
[1]
Wilbur Schramm, 1988, Wilbur Schramm and the Beginning
of American Communication Theory : A History of
Ideas, Dissertation Ph.D Iowa University.
[2]
Glen Durfee, 2002, Cryptanalysis of RSA Using Algebraic
and Lattice Methods, Dissertation Ph.D Stanford
University.
[3]
Eli Biham, Adi Shamir, 1993, Differential Cryptanalysis of
the Data Encryption Standard, Springer-Verlag.
[4]
Mitsuru Matsui, 1994, Linear cryptanalysis method for DES
cipher, Advances in Cryptology, Proceedings of
Eurocrypt ’93, Lecture Notes in Computer Science
765, T. Helleseth, Ed., Springer-Verlag, pp. 386–
397.
[5]
N. Courtois, G. Bard, 2007, Algebraic Cryptanalysis of the
Data Encryption Standard, IMA Int. Conf.
Proceedings, LNCS 4887, pp.152-169, Springer.
[6]
A. Biryukov, 2005, Boomerang Attack on 5 and 6-Round
Reduced AES, LNCS 3373, pp.11-15, Springer.
[7]
National Institude of Standards and Technology, 2001, Data
Encryption Standard, Federal Information
Processing Standard, FIPS-97, U.S. Department of
Commerce.
[8]
Joan Daeman & Vincent Rijmen, 2002, The Design of
Rijdael, AES-The Advanced Encryption Standard,
Springer-Verlag.
!51
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
Simarmata, Janner. 2005. Pengamanan Sistem Komputer.
Yogyakarta: Andi.
Kromodimoeljo, Sentot, 2010, Teori dan Aplikasi
Kriptografi, Jakarta: SPK IT Consulting.
Barkan, E. & Biham, E., 2006, In How Many Ways Can You
Write Rijndael, Advances in Crytology, proceedings
of Asiacrypt 2002, Laecture Notes in Computer
Science 2501, Springer-Verlag, pp 160-175.
Munir, Rinaldi, 2006, Kriptografi, Bandung : Informatika.
Rubik’s Official Website, Rubik’s World Sube Fact, http://
www.rubiks.com/world/ cube_facts.php (Diakses
pada tanggal 28 Februari 2014).
Richard E. Korf, Larry A. Taylor, 1993, Pruning Duplicate
Nodes in Depth-First Search, Proceedings of the
Eleventh National Conference on Artificial
Intelligence, Washington, D.C, pp. 756-761.
Dafid, 2006, Kriptografi Kunci Simetris Dengan
Menggunakan Algoritma Crypton, Jurnal Ilmiah
STMIK MDP Palembang , vol. 2, no. 3, pp. 24-27.
Nugroho, R. P. C., 2013, Perancangan dan Implementasi
Algoritma Kriptografi Kunci Simetri Alay-Yielded
Octal, Makalah IF3058 Kriptografi, 2012/2013.
Daemen, J. & Rijmen, V., 2002, The Design of Rijndael :
AES-The Advanced Encryption Standard, Berlin:
Springer-Verlag.
Menezes, Alfred J., van Oorschot, Paul C., dan Vanstone,
Scott A., 1997, Handbook of Applied Cryptography,
Florida: CRC Press.
Zimmermann, Phil, 2003, An Introduction to Cryptography,
California: PGP Corporation.
V-CUBE™ Verdes Innovations S.A. Official Web Page,
https://www.v-cubes.com/products/v-classics
(Diakses pada tanggal 28 Februari 2014).
!52
[21]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
Stinson, D.R., 1995, Cryptography Theory and Practice,
Florida: CRC Press, Inc.
Redman, P., 2006. Good essay writing: a social sciences
guide. 3rd ed. London: Open University in assoc.
with Sage.
Liwandouw, V. B., & Wowor, A.D., 2015, Desain Algoritma
Berbasis Kubis Rubik dalam Perancangan
Kriptografi Simetris, Seminar Teknik Informatika
dan Sistem Informasi (SETISI), 9 April 2015,
Bandung: FTI - Universitas Kristen Marantha.
Forouzan, Behrouz, A., 2008, Cryptography and Network
Security, New York: Mc Graw Hill
Singmaster, David, 1982, Notes on Rubik’s Magic Cube,
New Jersey: Enslow Publishers.
V-CUBE™ Verdes Innovations S.A. Official Web Page,
https://www.v-cubes.com/products/v-classics
(Diakses pada tanggal 28 Februari 2014).
Montgomery, D.C., & Runger, G.C., 2011, Applied Statistics
and Probability for Engineers, New York: Fifth
Edition, John Wiley & Sons.
Ariyus, Dony, 2006, Kriptografi: Keamanan Data dan
Komunikasi, Yogyakarta: Graha Ilmu.
Vania B. Liwandow & Alz Danny Wowor, 2015, Kombinasi
Algoritma Rubik, CPSNRG Chaos, dan S-Box
Fungsi Linier dalam Perancangan Kriptografi
Cipher Blok, Seminar Nasional Sistem Informasi
(SESINDO), Surabaya: Institut Teknologi Sepuluh
November.
Widodo, A., Wowor, A.D., Mailoa, E., & Pakereng, M.A.I.,
2015, Perancangan Kriptografi Block Cipher
berbasis pada Teknik Tanam Padi dan Bajak Sawah,
Seminar Nasional Teknologi dan Sistem Informasi
(SETISI), Bandung: Universitas Kristen Maranatha.
!53
[32]
[33]
Santoso, H.Y., Wowor, A.D., & Pakereng, M.A.I., 2015,
Perancangan Kriptografi Block Cipher Berbasis
pada Alur Clamshell’s Growth Rings, Seminar
Nasional Teknologi dan Sistem Informasi (SETISI),
Bandung: Universitas Kristen Maranatha.
Setiawan, A.N., Wowor, A.D., & Pakereng, M.A.I. 2015,
Perancangan Algoritma pada Kriptografi Block
Cipher dengan Teknik Langkah Kuda Catur,
Seminar Nasional Teknologi dan Sistem Informasi
(SETISI), Bandung: Universitas Kristen Maranatha.
!54
[1]
Wilbur Schramm, 1988, Wilbur Schramm and the Beginning
of American Communication Theory : A History of
Ideas, Dissertation Ph.D Iowa University.
[2]
Glen Durfee, 2002, Cryptanalysis of RSA Using Algebraic
and Lattice Methods, Dissertation Ph.D Stanford
University.
[3]
Eli Biham, Adi Shamir, 1993, Differential Cryptanalysis of
the Data Encryption Standard, Springer-Verlag.
[4]
Mitsuru Matsui, 1994, Linear cryptanalysis method for DES
cipher, Advances in Cryptology, Proceedings of
Eurocrypt ’93, Lecture Notes in Computer Science
765, T. Helleseth, Ed., Springer-Verlag, pp. 386–
397.
[5]
N. Courtois, G. Bard, 2007, Algebraic Cryptanalysis of the
Data Encryption Standard, IMA Int. Conf.
Proceedings, LNCS 4887, pp.152-169, Springer.
[6]
A. Biryukov, 2005, Boomerang Attack on 5 and 6-Round
Reduced AES, LNCS 3373, pp.11-15, Springer.
[7]
National Institude of Standards and Technology, 2001, Data
Encryption Standard, Federal Information
Processing Standard, FIPS-97, U.S. Department of
Commerce.
[8]
Joan Daeman & Vincent Rijmen, 2002, The Design of
Rijdael, AES-The Advanced Encryption Standard,
Springer-Verlag.
!51
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
Simarmata, Janner. 2005. Pengamanan Sistem Komputer.
Yogyakarta: Andi.
Kromodimoeljo, Sentot, 2010, Teori dan Aplikasi
Kriptografi, Jakarta: SPK IT Consulting.
Barkan, E. & Biham, E., 2006, In How Many Ways Can You
Write Rijndael, Advances in Crytology, proceedings
of Asiacrypt 2002, Laecture Notes in Computer
Science 2501, Springer-Verlag, pp 160-175.
Munir, Rinaldi, 2006, Kriptografi, Bandung : Informatika.
Rubik’s Official Website, Rubik’s World Sube Fact, http://
www.rubiks.com/world/ cube_facts.php (Diakses
pada tanggal 28 Februari 2014).
Richard E. Korf, Larry A. Taylor, 1993, Pruning Duplicate
Nodes in Depth-First Search, Proceedings of the
Eleventh National Conference on Artificial
Intelligence, Washington, D.C, pp. 756-761.
Dafid, 2006, Kriptografi Kunci Simetris Dengan
Menggunakan Algoritma Crypton, Jurnal Ilmiah
STMIK MDP Palembang , vol. 2, no. 3, pp. 24-27.
Nugroho, R. P. C., 2013, Perancangan dan Implementasi
Algoritma Kriptografi Kunci Simetri Alay-Yielded
Octal, Makalah IF3058 Kriptografi, 2012/2013.
Daemen, J. & Rijmen, V., 2002, The Design of Rijndael :
AES-The Advanced Encryption Standard, Berlin:
Springer-Verlag.
Menezes, Alfred J., van Oorschot, Paul C., dan Vanstone,
Scott A., 1997, Handbook of Applied Cryptography,
Florida: CRC Press.
Zimmermann, Phil, 2003, An Introduction to Cryptography,
California: PGP Corporation.
V-CUBE™ Verdes Innovations S.A. Official Web Page,
https://www.v-cubes.com/products/v-classics
(Diakses pada tanggal 28 Februari 2014).
!52
[21]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
Stinson, D.R., 1995, Cryptography Theory and Practice,
Florida: CRC Press, Inc.
Redman, P., 2006. Good essay writing: a social sciences
guide. 3rd ed. London: Open University in assoc.
with Sage.
Liwandouw, V. B., & Wowor, A.D., 2015, Desain Algoritma
Berbasis Kubis Rubik dalam Perancangan
Kriptografi Simetris, Seminar Teknik Informatika
dan Sistem Informasi (SETISI), 9 April 2015,
Bandung: FTI - Universitas Kristen Marantha.
Forouzan, Behrouz, A., 2008, Cryptography and Network
Security, New York: Mc Graw Hill
Singmaster, David, 1982, Notes on Rubik’s Magic Cube,
New Jersey: Enslow Publishers.
V-CUBE™ Verdes Innovations S.A. Official Web Page,
https://www.v-cubes.com/products/v-classics
(Diakses pada tanggal 28 Februari 2014).
Montgomery, D.C., & Runger, G.C., 2011, Applied Statistics
and Probability for Engineers, New York: Fifth
Edition, John Wiley & Sons.
Ariyus, Dony, 2006, Kriptografi: Keamanan Data dan
Komunikasi, Yogyakarta: Graha Ilmu.
Vania B. Liwandow & Alz Danny Wowor, 2015, Kombinasi
Algoritma Rubik, CPSNRG Chaos, dan S-Box
Fungsi Linier dalam Perancangan Kriptografi
Cipher Blok, Seminar Nasional Sistem Informasi
(SESINDO), Surabaya: Institut Teknologi Sepuluh
November.
Widodo, A., Wowor, A.D., Mailoa, E., & Pakereng, M.A.I.,
2015, Perancangan Kriptografi Block Cipher
berbasis pada Teknik Tanam Padi dan Bajak Sawah,
Seminar Nasional Teknologi dan Sistem Informasi
(SETISI), Bandung: Universitas Kristen Maranatha.
!53
[32]
[33]
Santoso, H.Y., Wowor, A.D., & Pakereng, M.A.I., 2015,
Perancangan Kriptografi Block Cipher Berbasis
pada Alur Clamshell’s Growth Rings, Seminar
Nasional Teknologi dan Sistem Informasi (SETISI),
Bandung: Universitas Kristen Maranatha.
Setiawan, A.N., Wowor, A.D., & Pakereng, M.A.I. 2015,
Perancangan Algoritma pada Kriptografi Block
Cipher dengan Teknik Langkah Kuda Catur,
Seminar Nasional Teknologi dan Sistem Informasi
(SETISI), Bandung: Universitas Kristen Maranatha.
!54