99
DAFTAR PUSTAKA
A. Menezes, P. van, Oorschot, and S. Vanstone. 1997. Handbook of Applied Cryptography. USA: CRC Press, Inc.
Ariyus, Dony. 2006. Komputer Security. Yogyakarta: ANDI.
Bishop, Matt. 2005. Introduction to Computer Security. Boston: Pearson Eduction, Inc.
Cox, Ingemar J. 2008. Digital Watermarking and Steganography. USA: Morgan Kaufmann Publications.
Kurniawan, Yusuf. 2004. Kriptografi Keamanan Internet dan Jaringan Komunikasi. Cetakan Pertama. Bandung: Informatika Bandung.
Marcus, Teddy & CS. 2005. _Pemrograman Delphi dengan ADO Express. Bandung: Informatika.
Munir, Rinaldi. 2006. Kriptografy. Bandung: Informatika.
Oppliger, Rolf. 2005. Contemporary Cryptography. USA: Artech House, Inc.
100
Rhee, Man Young. 1994. Crytography and Secure Communications. Korea: McGraw-Hill Book Co.
Richard M. Low, Mark Stamp. 2007. Applied Cryptanalysis Breaking Ciphers in the Real World. USA: John Wiley & Sons, Inc.
Schneier, Bruce. 1996. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C. USA: John Wiley & Sons, Inc.
Setiawan, Yudha. 2005. Tips Delphi Praktis dan Singkat. Yogyakarta: ANDI. Stallings, William. 2006. Cryptography and Network Security. United State Of
America. Person Prentice Hall.
Young Rhee, Man. 2003. Internet Security: Cryptographic Principles, Algorithms and Protocols. USA: John Wiley & Sons Inc.
Amanda, Secure Hash Algorithm ( SHA ) :
http://amanjdac.Integerpress.com/2007/12/19/secure-hash-algorithm Diakses tanggal
6 Mei 2008.
Setiadi, Budi, Analisis Sistem Keamanan Data Dengan Menggunakan Metoda Des dan Metoda Gost: http://geocities.com/roojenoeng/budi.rtf Diakses tanggal 10 April 2008.
101
Supriyanto, Hadi, Pengamanan Pesan Dengan Tanda Tangan Digital “GOST 34.10 (Russian DSA)” : http://budi.insan.co.id/courses/el695/projects2002-2003/hadi-report.doc Diakses tanggal 10 April 2008.
Haryanto, Pengantar Kriptografi:
http://staffsite.gunadarma.ac.id/haryanto/index.php?stateid=download&id=7261&part
=files Diakses tanggal 10 April 2008.
Truong, Long, Ben Lee III. 2002. Steganography.
http://islab.oregonstate.edu/koc/ece478/02Report/LT.pdf Diakses tanggal 7 Juli 2008.
Helena, Maria,Steganalisis Khusus dengan Pendekatan Subjektif dan Statistik pada Stego Gambar:
http://www.informatika.org/~rinaldi/Kriptografi/2006-2007/Makalah1/Makalah1-030.pdf Diakses tanggal 10 April 2008.
Rodiah, Penyembunyian Pesan (Steganografi) Pada Gambar:
http://staffsite.gunadarma.ac.id/rodiah/index.php?stateid=download&id=385&part=pu
blication Diakses tanggal 10 April 2008.
Sellars, Duncan. "An Introduction to Steganography."
http://www.totse.com/en/privacy/encryption/163947.html Diakses tanggal 11 Mei 2008.
SHA hash functions:
http://en.wikipedia.org/wiki/SHA-1.htm Diakses tanggal 2 Mei 2008.