62
DAFTAR PUSTAKA
Anggirasa, G. 2015. Teknik Pemecahan Kunci Privat ElGamaldengan Algoritma
Baby-step Giant-step. Skripsi. Universitas Sumatera Utara: Medan.
Batten, L. M. 2013. Public Key Cryptography: Application and Attacks. IEEE Press: Australia.
ElGamal, Taher. 1975. A Public Key Cryptosystem and a SignatureScheme Based on Discrete Logarithms. United States: Springer-Verlag.
Kromodimoeljo, Sentot. 2010. Teori Dan Aplikasi Kriptografi. Jakarta: SPK IT Consulting.
LaMacchia, B.A. & Odlyzko, A.M. 1992. Computation of Discrete Logarithms in Prime Fields. AT&T Bell Laboratories: New Jersey.(Online) http:// citeseerx.ist.psu.edu/viewdoc/download;jsessionid=79D3CEB49351DEC70D0B6 C38C16A06DC?doi=10.1.1.102.1729&rep=rep1&type=pdf (1 Desember 2015)
Meier, Andreas V. The ElGamal Cryptosystem. 2005. Technische Universität München Fakultät für Informatik: Munchen.(Online) http://www14.in.tum.de/konferenzen/ Jass05/courses/1/papers/meier_paper.pdf (7 Septermber 2015)
Menezes, A. J., Oorschot, P. C. & Vanstone, S. A. 1996. Handbook of Applied Cryptography. CRC Press, Inc: United States.
Mollin, Richard, A. 2005. Codes: the guide to secrecy from ancient to modern times. Chapman & Hall/CRC: Boca Raton.
63
Mollin, Richard, A. 2007. An Introduction to Cryptography. Chapman & Hall/CRC: Boca Raton.
Pressman, Ph.D. Roger S. 2010. Pendekatan Praktisi Rekayasa. Perangkat Lunak. Edisi 7. Penerbit Andi. Yogyakarta.
Schneier, Bruce. 1996. Applied Cryptography, Second Edition. John Wiley & Sons, Inc: United States.
Schneier, Bruce. 2000. A Self-Study Course in Block-Cypher Cryptanalysis. Counterpane Internet Security: USA. (Online) schneier.com/academic/paper /paperfiles/paper-self-study.pdf
Siang, J. J. 2002. Matematika Diskrit dan Aplikasinya. Penerbit Andi: Yogyakarta.
Whitten, Jeffery L., Bentley, Loonie D., Dittman, Kevin C. 2004. Metode Desain & Analisis Sistem. Penerbit Andi: Yogyakarta.
Winardi. 1989. Pengantar Tentang Teori Sistem Dan Analisis Sistem. CV. Mandar Maju: Bandung.