DAFTAR PUSTAKA
Ambedkar , B.R, Bedi, S.S. 2011. A New Factorization Method to Factorize RSA
Public Key Encryption. Paper. Bareilly, India: MJP Rohilkhand University.
Barnes, C. 2004. Integer Factorization Algorithms. Journal. Corvallis, United States: Oregon State University.
Baten, L. M. 2013. Public Key Cryptography: Application and Attacks. The Intitue of Electrical and Electrics and Engineers.Inc. United States: John Wiley & Sons.Inc.
Galbraith, S.D. 2012. Mathematics of Public Key Criptography. Cambridge:
Cambridge University Press.
Grandall, R., Pomerance, C. 2005. Prime Numbers A Computational Perspective. Edisi ke-2. New York: Springer.
Hinek, M. J. 2010. Cryptanalysis of RSA and Its Variants. Florida: Chapman & Hall / CRC.
Imani, P. 2002. Analisis Keamanan Kriptosistem Kunci Publik RSA. Skripsi. Bogor, Indonesia: Institut Pertanian Bogor.
Mollin, R. A. 2002. RSA and Public-Key Cryptography. Florida: Chapman & Hall/CRC.
Mollin, R. A. 2005. CODES The Guide To Secrecy From Ancient To Modern Times. Florida: Chapman & Hall/CRC.
Ramadhan, A. dkk. 2007. Basic of Cryptanalis. Jurnal. Bogor: Sekolah Tinggi Sandi Negara.
Rambe, M. J. 2010. Analisa dan Implementasi Keamanan E-Mail Menggunakan
Algoritma RSA Sebagai Enkripsi dan Dekripsi pada Mozilla Thunderbird.
Skripsi. Medan, Indonesia: Universitas Sumatera Utara.
Sadikin, R. 2012. Kriptografi Untuk Keamanan Jaringan. Yogyakarta: Penebit Andi.
Schneier, B. 1996. Applied Cryptography. Second Edition. United States: Peachpit Press.
Simarmata, A. M. 2012. Rancangan Model Algoritma Pohlig-Hellman Multiple-Key
Berdasarkan Algoritma RSA Multiple-Key. Tesis. Medan, Indonesia:
Universitas Sumatera Utara.
Singh, K., Verma, R., Chehal, R. 2012. Modified Prime Number Factorization
Algorithm (MPFA) for RSA Public Key Encryption. Paper. Jind, India: IJSCE
Sutomo, T. 2005. Metode Pollard Rho dan Aplikasinya pada Penyelesaian IFP
(Integer Factorization Problem) dan ECDLP (Elliptic Curve Discrete
Logarithm Poblem). Skripsi. Depok, Indonesia : Universitas Indonesia.
Yan, S. Y. 2008. Cryptanalytic Attacks on RSA. New York: Springer.