69
DAFTAR PUSTAKA
Annalakshmi Mu, Padmapriya . 2013. Zigzag Cipher: A Novel
Transposition Method. International Journal of Computer Applications
(0975 – 8887) International Conference on Computing and information Technology (IC2IT-2013)
Ariyus, Dony. 2006. Kriptografi Keamanan Data dan Komunikasi. Yogyakarta: Penerbit Graha Ilmu
Arifin Zainal, 2009. Studi Kasus Penggunaan Algoritma RSA Sebagai Algoritma Kriptografi yang Aman, Jurnal Informatika Mulawarman Vol 4 No. 3
Ariyus Dony. 2008. Pengantar Ilmu KRIPTOGRAFI Teori, Analisis, dan Implementasi, Yogyakarta: ANDI
Balasubramanian Kannan. 2014. Variants of RSA and their Cryptanalysis. International Conference on Communication and Network Technologies (ICCNT)
Bakthiari majid, Maarof Mohd Aizaini. 2012. Serious Security Weakness in RSA Cryptosystem. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Online): 1694-0814
C* Navaneethan, 2016. ADVANCED RAIL FENCE CIPHER ALGORITHM. Navaneethan C* et al. /International Journal of Pharmacy & Technology Dafid. 2006. Kriptografi Kunci Simetris Dengan Menggunakan Algoritma Crypton.
Jurnal Ilmiah STMIK GI MDP 3: 20-27.
Goshwe.Nentawe Y. 2013. Data Encryption and Decryption Using RSA Algorithm in a Network Environment. IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.7
Ginting Albert, Ismanto R. Rizal, Windasari Ike Pertiwi.2015. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email. Jurnal teknologi dan sistem komputer, Vol3, No.2, April 2015(e-ISSN: 2338-0403).
Hari Eko Rachmawanto, Atika Christy Sari. 2015. Keamanan File Menggunakan Teknik Kriptografi Shift Cipher. Techno.COM, Vol. 14, No. 4, November 2015: 329-335
Kurniawan Yusuf, 2004. Kriptografi keamanan internet dan jaringan komputer, Bandung: Informatika Bandung
Munir, Rinaldi. 2006. Kriptografi. Bandung, Indonesia: Penerbit Informatika. Munir, Rinaldi. 2006. Tipe dan Mode Algoritma Simetri. Bandung: Institut
Teknologi Bandung
Mollin, Richard A. 2007. An Introduction to Cryptography 2nd Edition. New York: Taylor & Francis Group, LLC.
Nandal, Aarti., Singh, Ajit. & Malik, Swati. 2012. Implementation of Caesar Cipher with Rail Fence for Enhacing Data Security. International Journal of Advanced Research in Computer Science and Software Engineering, 2 (12): 78-82. Patel Gaurav R, Panchal Prof.Krunal.2014. Hybrid Encryption Algorithm. IJEDR |
Volume 2, Issue 2 | ISSN: 2321-9939
70
P.Smart Nigel. 2016. Ceriptograpy Made Simple. New York: Springer Internasional Publishing Switzerland
Pramanik, Malay B. 2014. Implementation of Cryptography Technique using Columnar Transposition. International Journal of Computer Applications. (0975-8887), 19-23.
Sadikin Rifki. 2012. Kriptografi untuk keamanan jaringan dan dasar matematika untuk kriptografi, Yogyakarta: ANDI
Shankara Meenakshi, P.Akshaya. 2014. Hybrid Cryptographic Technique Using RSA Algorithm and Schenduling Concepts. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6
Singh Soram Ranbir, Khan Kumar Ajoy. 2016. Performance Evaluation of RSA and Elliptic Curve Cryptography. 2nd International Conference on Contemporary Computing and Informatics (ic3i)
Wandani Henny, Andri Budiman Muhammad, Sharif Amer . 2012. Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem. Jurnal. Program Studi S1 Ilmu Komputer, Universitas Sumatera Utara