DAFTAR PUSTAKA
Al Fatta, Hanif. 2007. Analisis & Perancangan Sistem Informasi untuk Keunggulan Bersaing Perusahaan & Organisasi Modern. Penerbit Andi: Yogyakarta. Alghazzawi, Daniyal M., Hasan, Syed Hamid. & Trigui, Mohamed Salim. 2013.
Stream Ciphers: A Comparative Study of Attacks and Structures. International Journal of Computer Applications 1: 27-29.
Ariyus, Dony. 2008. Pengantar ilmu Kriptografi, Teori, analisis dan Implementasi. Penerbit Andi: Yogyakarta.
Azizah, Ulfah Nur. 2013. Perbandingan Detektor Tepi Prewitt dan Detektor Tepi Laplacian Berdasarkan Kompleksitas Waktu dan Citra Hasil. Skripsi. Universitas Pendidikan Indonesia.
Banik, Subhadeep. & Jha, Sonu. 2015. “Some Security Results of The RC4+ Stream Cipher”. Security and Communication Network, 8(18): 4061-4072.
Biryukov, Alex., Canniѐre, Christophe De., Braeken, An. & Preneel, Bart. 2003. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Al gorithms*.
Springer-Verlag, 33-50.
Budiman, M A. & Rachmawati, D. 2017. On Using Goldbach G0 Codes and Even-Rodeh Codes for Text Compression. IOP Conf. Series: Materials Science and Engineering 1: 1-5.
Churchhouse, R. F. 2002. Code and Ciphers: Julius Caesar, the Enigma and the Internet, Cambridge University Press: Cambridge.
Cormen, Thomas H., Leiserson, Chales E., Rivest, Ronald L. & Stein, Clifford. 2009.
Introduction to Algorithms. 3rd Edition. The MIT Press: United State of America.
Dafid. 2006. Kriptografi Kunci Simetris Dengan Menggunakan Algoritma Crypton.
Jurnal Ilmiah STMIK GI MDP 3: 20-27.
Hartono, Jogiyanto. 2005. Analisis dan Desain Sistem Informasi: Pendekatan Terstruktur Teori dan Praktik Aplikasi Bisnis. Edisi Ketiga. Andi Offset: Yogyakarta.
Mollin, R. 2007. An Introduction to Cryptography: Discrete Mathematics and Its Applications. Kenneth H. Rosen. 2nd Edition. Taylor & Francis Group, LLC: New York.
Munir, Rinaldi. 2006. Kriptografi. Penerbit Informatika: Bandung.
Nandal, Aarti.,Singh, Ajit. & Malik, Swati. 2012. Implementation of Caesar Cipher with Rail Fence for Enhacing Data Security. International Journal of Advanced Research in Computer Science and Software Engineering, 2 (12): 78-82.
Oppliger, Rolf. 2005. Contemporary Cryptography. Artech House, Inc: London.
Padmapriya, Ph.D, A. & Mu. Annalakshmi, 2013. Zigzag Ciphers: A Novel Transposition Method. International Journal of Computer Applications (0975 – 8887),8-12.
Paul, Goutam, & Maitra, Subhamoy. 2012. RC4 Stream Cipher and Its Variants. CRC Press Taylor & Francis Group: London.
Pramanik, Malay B. 2014. Implementation of Cryptography Technique using Columnar Transposition. International Journal of Computer Applications. (0975-8887), 19-23.
Pujianto. 2012. Analisis dan Perancangan Sistem Informasi Penjualan Buku Dengan Konsinyasi Berbasis Client/Server. Jurnal Informatika 2: 118-127.
Sadikin, Rifki. 2012. Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Andi Offset: Yogyakarta.
Schneier, Bruce. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition. New York.
Sebayang, A.M.S. 2014. Implementasi kombinasi beaufort cipher dan affine cipher
pada three-pass protocol. Skripsi. Universitas Sumatera Utara.
Setyaningsih, Emy., Iswahyudi, Catur. & Widyastuti, Naniek. 2011. Konsep Super Enkripsi Untuk Meningkatkan Kemanan Data Citra. Prosiding Seminar Nasional Teknologi Informasi (SNASTI 2011), pp. 7-10.
Syuhada, Muhammad Yudha. 2017. Implementasi Algoritma RC4 dan Keyed-Hash Message Authentication Code (HMAC) Pada Keamanan dan Integritas Short Message Service (SMS). Skripsi. Universitas Sumatera Utara.
Whitten, Jeffery L., Bentley, Lonnie D., Dittman, Kevin C. 2004. Metode Desain & Analisis Sistem. Edisi 6. McGraw-Hill: New York.
Whitten, Jeffrey L. & Bentley, Lonnie D. 2007. Systems Analysis & Design Methods. 7th Edition. McGraw-Hill/Irwin: New York.
Zelvina, Anandia., Efendi, Syahril. & Arisandi, Dedy. 2012. Perancangan Aplikasi Pembelajaran Kriptografi Kunci Publik ElGamal Untuk Mahasiswa. Jurnal Dunia Teknologi Informasi 1: 56-62.