Daftar Pustaka
[1] Wilbur Schramm, 1988, Wilbur Schramm and the Beginning
of American Communication Theory : A History of
Ideas, Dissertation Ph.D Iowa University.
[2] Glen Durfee, 2002, Cryptanalysis of RSA Using Algebraic
and Lattice Methods, Dissertation Ph.D Stanford
University.
[3] Eli Biham, Adi Shamir, 1993, Differential Cryptanalysis of
the Data Encryption Standard, Springer-Verlag.
[4] Mitsuru Matsui, 1994, Linear cryptanalysis method for DES
cipher, Advances in Cryptology, Proceedings of
Eurocrypt ’93, Lecture Notes in Computer Science
765, T. Helleseth, Ed., Springer-Verlag, pp. 386–
397.
[5] N. Courtois, G. Bard, 2007, Algebraic Cryptanalysis of the
Data Encryption Standard, IMA Int. Conf.
Proceedings, LNCS 4887, pp.152-169, Springer.
[6] A. Biryukov, 2005, Boomerang Attack on 5 and 6-Round
Reduced AES, LNCS 3373, pp.11-15, Springer.
[7] National Institude of Standards and Technology, 2001, Data
Encryption Standard, Federal Information
Processing Standard, FIPS-97, U.S. Department of
Commerce.
[8] Joan Daeman & Vincent Rijmen, 2002, The Design of Rijdael, AES-The Advanced Encryption Standard, Springer-Verlag.
!
[9] Simarmata, Janner. 2005. Pengamanan Sistem Komputer. Yogyakarta: Andi.
[10] Kromodimoeljo, Sentot, 2010, Teori dan Aplikasi Kriptografi, Jakarta: SPK IT Consulting.
[11] Barkan, E. & Biham, E., 2006, In How Many Ways Can You Write Rijndael, Advances in Crytology, proceedings of Asiacrypt 2002, Laecture Notes in Computer Science 2501, Springer-Verlag, pp 160-175.
[12] Munir, Rinaldi, 2006, Kriptografi, Bandung : Informatika.
[13] Rubik’s Official Website, Rubik’s World Sube Fact, http:// www.rubiks.com/world/ cube_facts.php (Diakses pada tanggal 28 Februari 2014).
[14] Richard E. Korf, Larry A. Taylor, 1993, Pruning Duplicate Nodes in Depth-First Search, Proceedings of the Eleventh National Conference on Artificial Intelligence, Washington, D.C, pp. 756-761.
[15] Dafid, 2006, Kriptografi Kunci Simetris Dengan Menggunakan Algoritma Crypton, Jurnal Ilmiah STMIK MDP Palembang , vol. 2, no. 3, pp. 24-27.
[16] Nugroho, R. P. C., 2013, Perancangan dan Implementasi Algoritma Kriptografi Kunci Simetri Alay-Yielded Octal, Makalah IF3058 Kriptografi, 2012/2013.
[17] Daemen, J. & Rijmen, V., 2002, The Design of Rijndael :
AES-The Advanced Encryption Standard, Berlin: Springer-Verlag.
[18] Menezes, Alfred J., van Oorschot, Paul C., dan Vanstone, Scott A., 1997, Handbook of Applied Cryptography, Florida: CRC Press.
[19] Zimmermann, Phil, 2003, An Introduction to Cryptography, California: PGP Corporation.
[20] V-CUBE™ Verdes Innovations S.A. Official Web Page, https://www.v-cubes.com/products/v-classics (Diakses pada tanggal 28 Februari 2014).
!
[21] Stinson, D.R., 1995, Cryptography Theory and Practice, Florida: CRC Press, Inc.
[23] Redman, P., 2006. Good essay writing: a social sciences guide. 3rd ed. London: Open University in assoc. with Sage.
[24] Liwandouw, V. B., & Wowor, A.D., 2015, Desain Algoritma Berbasis Kubis Rubik dalam Perancangan Kriptografi Simetris, Seminar Teknik Informatika dan Sistem Informasi (SETISI), 9 April 2015, Bandung: FTI - Universitas Kristen Marantha.
[25] Forouzan, Behrouz, A., 2008, Cryptography and Network
(Diakses pada tanggal 28 Februari 2014).
[28] Montgomery, D.C., & Runger, G.C., 2011, Applied Statistics and Probability for Engineers, New York: Fifth Edition, John Wiley & Sons.
[29] Ariyus, Dony, 2006, Kriptografi: Keamanan Data dan Komunikasi, Yogyakarta: Graha Ilmu.
[30] Vania B. Liwandow & Alz Danny Wowor, 2015, Kombinasi Algoritma Rubik, CPSNRG Chaos, dan S-Box Fungsi Linier dalam Perancangan Kriptografi Cipher Blok, Seminar Nasional Sistem Informasi (SESINDO), Surabaya: Institut Teknologi Sepuluh November.
[31] Widodo, A., Wowor, A.D., Mailoa, E., & Pakereng, M.A.I., 2015, Perancangan Kriptografi Block Cipher berbasis pada Teknik Tanam Padi dan Bajak Sawah, Seminar Nasional Teknologi dan Sistem Informasi (SETISI), Bandung: Universitas Kristen Maranatha.
!
[32] Santoso, H.Y., Wowor, A.D., & Pakereng, M.A.I., 2015,
Perancangan Kriptografi Block Cipher Berbasis pada Alur Clamshell’s Growth Rings, Seminar Nasional Teknologi dan Sistem Informasi (SETISI), Bandung: Universitas Kristen Maranatha.
[33] Setiawan, A.N., Wowor, A.D., & Pakereng, M.A.I. 2015,
Perancangan Algoritma pada Kriptografi Block Cipher dengan Teknik Langkah Kuda Catur, Seminar Nasional Teknologi dan Sistem Informasi (SETISI), Bandung: Universitas Kristen Maranatha.
!