62
DAFTAR PUSTAKA
Batten, L. M. 2013. Public Key Cryptography - Applications and Attacks, IEEE Press (2013) Australia.
Cormen, T. H., Leiserson, C. E., Rivest, R. L. & Stein, C. 2009. Introduction to Algorithms 3rd Ed. MIT Press: Massachusetts.
Digital Signature Standard (DSS).2010. Federal Information Processing Standards Publication (FIPS) 186-2. (Online) http://csrc.nist.gov/publications/fips /archive/fips186-2/fips186-2.pdf (10 Oktober 2015).
Galbraith, S. 2012. Mathematics of Public Key Cryptography. Cambridge England.
Hankerson, D., Menezes, A. & Vanstone, S. A. 2004. Guide Elliptic Curve Cryptography. Springer-Verlag Inc : New York.
Hoffstein, J., Pipher, J. & Silverman, J. H. 2008. An Introduction to Mathematical Cryptography, Springer Inc : New York.
Judson, T. W. & Austin, S. F. 2009. Abstract Algebra Theory and Applications, State University.
Kromodimoeljo, S. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting: Jakarta.
Koblitz, N. 1987. Elliptic Curve Cryptosystems, Mathematics of Computation48(177) : 203-209. (Online) http://www.ams.org/journals/mcom/1987-48-177/S0025-5718-1987-0866109-5 (2 Maret 2016).
Lenstra, Jr. H. W. 1987. Factoring integers with elliptic curves, Annals of
Mathematics 126(3): 649-673. (Online)
http://wstein.org/edu/124/lenstra/lenstra.pdf (2 Maret 2016).
Malhotra, M. 2014. A New Encryption Scheme Based on Enhanced RSA and ElGamal, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) 8(2) : 138-142 (Online) http://iasir.net/IJETCASpapers/IJETCAS14-336.pdf. (10 Oktober 2015).
Menezes, A., Oorschot, P. C. & Vanstone, S. A. 1996. Handbook of Applied Cryptography. CRC Press Inc : United States.
Miller, V. S. 1986. Use of elliptic curves in cryptography. Advances in Cryptology
’8 , Lecture Notes in Computer Science (LNCS) 218 :
pp. 417-426. (Online)
http://link.springer.com/chapter/10.1007/3-540-39799-X_31. (2 Maret 2016).
63
Mollin, R. A. 2002. RSA and Public-Key Cryptography. Chapman & Hall/CRC: Florida.
Mollin, R. A. 2007. An Introduction to Cryptography 2nd Ed. Chapman & Hall/CRC: Florida.
Munir, R. 2006. Kriptografi. Informatika: Bandung.
Paar, C., Pelzl, J., Preneel, B. 2010. Understanding Cryptography. Springer-Verlag: Berlin.
Putra, E. 2013. Implementasi Kriptografi Kurva Eliptik Dengan Algoritma Elgamal Dan Metode Pembangkitan Bilangan Prima Rabin-Miller Untuk Pengamanan File Teks. Skripsi. Universitas Sumatera Utara: Medan.
Tripathi, R. & Agrawal, S. 2014. Critical Analysis of RSA Public Key Cryptosystem.
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 4(7): 83-87. (Online) http://www.ijarcsse.com/docs/papers/Volume_4/7_July2014/V4I6-0356.pdf. (10 Oktober 2015).
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition. John Wiley & Sons, Inc: New Jersey.
Secure Hash Standart (SHS). 2015. Federal Information Processing Standards Publication (FIPS) 186-4. (Online) http://dx.doi.org/10.6028/NIST.FIPS.180-4. (19 Januari 2016).
Smart, N. 2004. Cryptography - An Introduction. McGraw-Hill College.
Whitten, J. L. & Bentley, L. D. 2007. Systems Analysis and Design for the Global Enterprise 7th Edition.McGraw-Hill College.