S IKOR 1104660 Bibliography

94

DAFTAR PUSTAKA

Ariyanto, E., Pravitasari, T. I., & Setyorini. (2008). Analisis Implementasi
Algoritma Stream Cipher Sosemanuk dan Dicing dalam Proses Enkripsi
Data. Seminar Nasional Informatika 2008, 351-357.
Ariyus, D. (2008). Pengantar Ilmu Kriptografi. Yogyakarta: C.V. Andi Offset.
Arora, M. (2012, Mei 7). How Secure is AES against brute force
attacks?[Online] . Retrieved 1 13, 2016, from EE Times:
http://www.eetimes.com/document.asp?doc_id=1279619
Badauni, A. P. (2015, Agustus 9). Akun Palsu di Media Sosial Jadi Provokator
Pilkada Pangkajene Kepulauan. [Online] . Retrieved Agustus 10, 2015,
from
Tempo.
Co
Nasional:
http://nasional.tempo.co/read/news/2015/08/09/058690344/akun-palsu-dimedia-sosial-jadi-provokator-pilkada-pangkajene-kepulauan
Damar, A. M. (2015, Desember 17). Kasus diskon palsu di harbolnas lazada akui
kecolongan [Online] . Retrieved Desember 19, 2015, from liputan6.com:
http://tekno.liputan6.com/read/2392408/kasus-diskon-palsu-di-harbolnaslazada-akui-kecolongan

Easttom, C. (2015). Modern Cryptography: Applied Mathematics for Encryption
and Information Security. New York: McGraw-Hill Education.
El Ghafar, A., Rohiem, A., Diaa, A., & Mohammed, F. (2009). Generation of
AES Key Dependent S-Boxes using RC4 Algorithm. 13th International
Conference on Aerospace Sciences & Aviation Technology, 1-9.
Ellminaam, D., Kader, H., & Hadhoud, M. (2009). Performance Evaluation of
Symmentric Encryption Algorithms. Communication of the IBIMA Volume
8, ISSN: 1943-7765, 58-64.
Frehner, C. (2008). Email, SMS, MMS : The Linguistic Creative of Asynchronous
Discourse in The New Media Age. Bern: International Academic
Publishers.
International Organization for Standardization. (2005). ISO/IEC 17799:2005.
Geneva: International Organization for Standardization.
ISO/IEC. (2005). Patent No. 17799. Swizterland.

94
Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK
AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu


95

Kemp, S. (2015, Januari 21). Digital, Social & Mobile in 2015. Retrieved Februari
19, 2016, from We Are Social: http://wearesocial.sg/blog/2015/01/digitalsocial-mobile-2015/
Kenny, C. (2005). Random Number Generators : An Evaluation and Comparison
of Random.org and Some Commonly Used Generators. Dublin: The
Distributed System Group, Computer Science Department, TDC.
Killmeyer, J. (2006). Information Security Architecture. Florida: Auerbach
Publications.
Kim, M. J., Lee, B. H., Kim, S. J., & Won, D. H. (2009). Weakness and
Improvments of a One-time Password Authentication Scheme.
International Journal of Future Generation Communication and
Networking Vol. 2, No. 4, 29-39.
Krishnamurthy, G., & Ramaswamy, D. (2008). Making AES Stronger: AES with
Key Dependent S-Box. International Journal of Computer Science and
Network Security, Vol.8 No.9, 388-398.
Kumar, M. (2008). Cryptography and Network Security. Meerut: Krishna
Prakasha Media.
Kumar, M., & Karthikeyan, D. (2012). Investigating Efficiency of Blowfish and

Rijndael (AES) Algorithm. I. J. Computer Network and Information
Security, 22-28.
Kurniawan, Y. (2004). Kriptografi Keamanan Internet dan Jaringan Komunikasi.
Bandung: Penerbit Informatika.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of
Applied Cryptography. Boca Raton: CRC Press.
Munir, R. (2004). Advance Encryption Standard. Bandung: Institut Teknologi
Bandung.
Munir, R. (2006). Kriptografi. Bandung: Penerbit Informatika.
Neal, D. (2011, Agustus 17). AES encryption is cracked: Researchers find a
weakness in the algorithm. Retrieved Desember 19, 2015, from The
INQUIRER:
http://www.theinquirer.net/inquirer/news/2102435/aesencryption-cracked
Pahlevi, N. (2012, April 25). Kriptografi Simetrik:Dasar Block Cipher . Retrieved
Desember 12, 2015, from Kriptografi dan Keamanan Informasi:
https://ilmukriptografi.wordpress.com/2012/04/25/kriptografi-simetrikdasar-block-cipher/
95
Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK
AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS

Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu

96

Panji, A. (2015, Juni 30). Lazada: iPhone 6 Plus jadi Sabun Dibeli Lewat
Merchant. Retrieved Oktober 10, 2015, from CNN Indonesia:
http://www.cnnindonesia.com/teknologi/20150630102701-18563213/lazada-iphone-6-plus-jadi-sabun-dibeli-lewat-merchant/
Parmar, H., Nainan, N., & Thaseen, S. (2012). Generation of Secure One-time
Password Based on Image Authentication. Computer Science &
Information Technology, 195-206.
Pitt, C., & John Wieland. (2013). Essential Information Security. Zaltbommel:
Van Haren Publishing.
Rohan, A. (2011). Advance Encryption Standard (AES) Modes of Operation.
Maryland: University of Maryland.
Sarno, R., & Irsyat, I. (2009). Sistem Manajemen Keamanan Informasi berbasis
ISO 27001. Surabaya: ITS Press.
Schneier, B. (1996). Applied Cryptography – Protocols, Algorithms and Source
Code in C. New York: John Wiley and Sons, Inc.
Sediyono, E., Santoso, K. I., & Suhartono. (2013). Secure Login by Using Onetime Password Authentication Based on MD5 Hash Encrypted SMS.
International Conference on Advances in Computing, Communication and

Informatics, 1604-1608.
Setiawan, A., & Sukmawati, N. E. (2014, Juni 21). Ribuan "Akun Robot" di
Media Sosial Ramaikan Kampanye Pilpres. Retrieved Agustus 10, 2015,
from Politik, Viva News: http://politik.news.viva.co.id/news/read/514723ribuan--akun-robot--di-media-sosial-ramaikan-kampanye-pilpres
Setyanugraha, D., & Akbar, S. (2015). Modified ShifRow AES with RoundKey.
Makalah IF 4020 Kriptografi.
Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System
Technical Journal.
Simarmata, J. (2010). Rekayasa Web. Yogyakarta: C.V. Andi Offset.
Sommerville, I. (2011). Software Enginering 9th Edition. Pearson.
Sonjaya, I. (2007). Uji Homogenitas Data Iklim Di Statsiun Klimatologi
Banjarbaru. Banjarbaru: Stasiun Klimatologi Banjarbaru.
Stalling, W. (2011). Cryptography and Network Security Principles and Practices
(Fifth ed.). New Jersey: Pearson Education.

96
Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK
AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu


97

Stiawan, D. (2005). Sistem Keamanan Komputer. Jakarta: PT. Elex Media
Komputindo.
Sulaiman, S., Muda, Z., & Juremi, J. (2012). The New Approach of Rijndael Key
Schedule. Cyber Security, Cyber Warfare and Digital Forensic
(CyberSec), 2012 International Cnference on, 23-27.
Sulianta, F. (2009). Teknik Mengoptimalkan Password. Jakarta: PT. Elex Media
Komputindo.
Suryadhi, A. (2014, Juni 23). Debat Capres, Akun Bot Gerilya Berkicau.
Retrieved
Agustus
10,
2015,
from
Detik
iNet:
http://inet.detik.com/read/2014/06/23/105421/2616068/398/debat-capresakun-bot-gerilya-berkicau
Sutiana, J. (2013). Implementasi Kriptografi Diffie-Hellman Dan RSA Dalam

Otentikasi Token Pada Internet Banking. Bandung: Program Studi Ilmu
Komputer, Universitas Pendidikan Indonesia.
Usman, & Nurdin. (2002). Konteks Implementasi Berbasis Kurikulum. Jakarta:
PT. Raja Grafindo Persada.
Wali, M. F., & Rehan, M. (2005). Effective Coding and Performance Evaluation
of the Rijndael Algorithm (AES). Karachi: NED University of Engineering
and Technology.
Wicaksono, R. (2009, Juli 27). Memahami Cara Kerja Token Internet Banking.
Retrieved Agustus 31, 2015, from Ilmu Hacking, Hackingology, Computer
Security Blog: http://www.ilmuhacking.com/web-security/memahamicara-kerja-token-internet-banking/
Wiratri, L. (2015, Juli 1). Kasus Lazada Berikan Dampak Buruk bagi ECommerce. Retrieved Oktober 6, 2015, from Okezone Techno:
http://techno.okezone.com/read/2015/07/01/207/1174356/kasus-lazadaberikan-dampak-buruk-bagi-e-commerce

97
Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK
AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu