Implementasi Modifikasi Sistem Kriptografi RSA dan Elliptic Curve Digital Signature Algorithm (ECDSA)

62

DAFTAR PUSTAKA

Batten, L. M. 2013. Public Key Cryptography - Applications and Attacks, IEEE Press
(2013) Australia.
Cormen, T. H., Leiserson, C. E., Rivest, R. L. & Stein, C. 2009. Introduction to
Algorithms 3rd Ed. MIT Press: Massachusetts.
Digital Signature Standard (DSS). 2010. Federal Information Processing Standards
Publication (FIPS) 186-2. (Online) http://csrc.nist.gov/publications/fips
/archive/fips186-2/fips186-2.pdf (10 Oktober 2015).
Galbraith, S. 2012. Mathematics of Public Key Cryptography. Cambridge England.
Hankerson, D., Menezes, A. & Vanstone, S. A. 2004. Guide Elliptic Curve
Cryptography. Springer-Verlag Inc : New York.
Hoffstein, J., Pipher, J. & Silverman, J. H. 2008. An Introduction to Mathematical
Cryptography, Springer Inc : New York.
Judson, T. W. & Austin, S. F. 2009. Abstract Algebra Theory and Applications, State
University.
Kromodimoeljo, S. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting: Jakarta.
Koblitz, N. 1987. Elliptic Curve Cryptosystems, Mathematics of Computation 48(177)
: 203-209. (Online) http://www.ams.org/journals/mcom/1987-48-177/S00255718-1987-0866109-5 (2 Maret 2016).


Lenstra, Jr. H. W. 1987. Factoring integers with elliptic curves, Annals of
Mathematics
126(3):
649-673.
http://wstein.org/edu/124/lenstra/lenstra.pdf (2 Maret 2016).

(Online)

Malhotra, M. 2014. A New Encryption Scheme Based on Enhanced RSA and
ElGamal, International Journal of Emerging Technologies in Computational
and Applied Sciences (IJETCAS) 8(2) : 138-142 (Online)
http://iasir.net/IJETCASpapers/IJETCAS14-336.pdf. (10 Oktober 2015).
Menezes, A., Oorschot, P. C. & Vanstone, S. A. 1996. Handbook of Applied
Cryptography. CRC Press Inc : United States.
Miller, V. S. 1986. Use of elliptic curves in cryptography. Advances in Cryptology
’8
, Lecture Notes in Computer Science (LNCS) 218 :
pp. 417-426. (Online) http://link.springer.com/chapter/10.1007/3-540-39799X_31. (2 Maret 2016).


Universitas Sumatera Utara

63

Mollin, R. A. 2002. RSA and Public-Key Cryptography. Chapman & Hall/CRC:
Florida.
Mollin, R. A. 2007. An Introduction to Cryptography 2nd Ed. Chapman & Hall/CRC:
Florida.
Munir, R. 2006. Kriptografi. Informatika: Bandung.
Paar, C., Pelzl, J., Preneel, B. 2010. Understanding Cryptography. Springer-Verlag:
Berlin.
Putra, E. 2013. Implementasi Kriptografi Kurva Eliptik Dengan Algoritma Elgamal
Dan Metode Pembangkitan Bilangan Prima Rabin-Miller Untuk Pengamanan
File Teks. Skripsi. Universitas Sumatera Utara: Medan.
Tripathi, R. & Agrawal, S. 2014. Critical Analysis of RSA Public Key Cryptosystem.
International Journal of Advanced Research in Computer Science and
Software
Engineering
(IJARCSSE)
4(7):

83-87.
(Online)
http://www.ijarcsse.com/docs/papers/Volume_4/7_July2014/V4I6-0356.pdf.
(10 Oktober 2015).
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in
C. 2nd Edition. John Wiley & Sons, Inc: New Jersey.
Secure Hash Standart (SHS). 2015. Federal Information Processing Standards
Publication (FIPS) 186-4. (Online) http://dx.doi.org/10.6028/NIST.FIPS.1804. (19 Januari 2016).
Smart, N. 2004. Cryptography - An Introduction. McGraw-Hill College.
Whitten, J. L. & Bentley, L. D. 2007. Systems Analysis and Design for the Global
Enterprise 7th Edition. McGraw-Hill College.

Universitas Sumatera Utara