DAFTAR PUSTAKA
[1] Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi: Teori Analisis dan Implementasi. Yogyakarta. Penerbit: Penerbit Andi.
[2] Enterprise, Jubilee. 2010. Trik Mengamankan Password. Jakarta : PT. Elex Media Komputindo.
[3] Kadir, A. 2012. Algoritma dan Pemrograman Menggunakan Java. Yogyakarta : Penerbit Andi.
[4] Munir, R. 2006. Kriptografi. Bandung : Penerbit Informatika Bandung.
[5] Munir, R. Matematika Diskrit. Bandung : Penerbit Informatika Bandung.
[6] Sulianta, F. 2009. Teknik Mengoptimalkan Password. Jakarta : PT. Elex
Media Komputindo.
[7] Schneier, B. 2001. Applied Cryptography. Canada: JhonWiley & Sons inc.
[8] Stalling, W. 2005. Cryptography and Network Security Principles and Practices, Fourth Edition. USA : Pearson Education, Inc.
[9] Sari, Y. 2009. Perancangan dan Implementasi Sistem Keamanan Data
Menggunakan Algoritma TEA Dengan Bahasa Pemrograman Delphi 7.0. Skripsi. Universitas Sumatera Utara
[10] Daemen, J., Govaerts, R., Vandewalle, J. 1993. Block Cipher Based On Modular Arithmertic. Proceeding of the 3rd Symposium on the State and Progress of Research in Cryptography. W. Wolfowicz, Ed., Fondazione Ugo Bordoni, pp 80-89.
[11] Latief, M. 2010. Studi Perbandingan Enkripsi Menggunakan Algoritma IDEA dan MMB. Media Elektrik. Volume 5, Nomor 2, Desember 2010.
[12] Devidas, S.P. 2013. " Passwords Management Using Blowfish Algorithm”.
IJRREST:International Journal of Research Review in Engineering
Science and Technology. Volume-2 Issue-1, March 2013, pp 48-52.