55
DAFTAR PUSTAKA
Ariyus, Dony. 2006.Computer Security.Penerbit Andi:Yogyakarta.
Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi : Teori, Analisis dan Implementasi
Penerbit Andi:Yogyakarta.
Caroline, Maureen Linda. 2011. Perbandingan Algoritma Kriptografi Kunci Publik RSA, Rabin, dan ElGamal.Makalah IF3058 Kriptografi.
Dooley, John F. 2013. A Brief History of Cryptology and Cryptographic Algorithms.Springer-Verlag Berlin Heidelberg: New York.
Goyal, Kashish.& Kinger, Supriya. 2013. Modified Caesar Cipher for Better Security Enhancement.International Journal of Computer Applications73(3): 0975 – 8887.
Horstmeyer, Roarke., Judkewitz, Benjamin., Vellekoop, Ivo M., Assawawarrarit, Sid. & Yang, Changhuei. 2013. Physical key-protected one-time pad. Scientific Reports3.
Kumar, Sohit. & Vashistha, Ashish. 2013. Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction. International Journal of Computer Applications74(19): 023-027.
Kromodimoeljo, Sentot. 2009. Teori dan Aplikasi Kriptografi. SPK IT Consulting: Indonesia.
Mollin, Richard A.. 2007. An Introduction to Cryptography. 2nd Edition. Taylor & Francis Group:Boca Raton.
56
Nemati, Hamid R. & Yang, Li. 2011. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering. Informatic Science Reference:New York.
Paar, Christof. & Pelzl, Jan. 2010.Understanding Cryptography : A Textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg: New York.
Sadikin, Rifki. 2012.Kriptografi untuk keamanan jaringan. CV Andi Offset: Yogyakarta
Schneier, Bruce., 1996, Applied Cryptography : Protocols, Algorithms, and Source Code in C, 2nd Edition JohnWiley & Sons Inc
Sharma, Shachi & Vinti, Gupta. 2013. Encryption and Decryption Using One Time Pad in Mac Layer. International Journal of Inovative Research in Science, Enginering and Technology (IJIRSET)2(6): 2248-2250
Srikantaswamy, S.G. & Phaneendra, Dr. H.D.. 2011. Enchanced One Time Pad Cipher with More Arithmetic and Logical Operations with Flexible Key Generation Algorithm. International Journal of Network Security & Its Application (IJNSA)3(6): 243-248.
Stamp, Mark., 2011.Information Security, 2ndEdition. JohnWiley & Sons Inc