94
94 Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
DAFTAR PUSTAKA
Ariyanto, E., Pravitasari, T. I., & Setyorini. (2008). Analisis Implementasi Algoritma Stream Cipher Sosemanuk dan Dicing dalam Proses Enkripsi Data. Seminar Nasional Informatika 2008, 351-357.
Ariyus, D. (2008). Pengantar Ilmu Kriptografi. Yogyakarta: C.V. Andi Offset. Arora, M. (2012, Mei 7). How Secure is AES against brute force
attacks?[Online]. Retrieved 1 13, 2016, from EE Times: http://www.eetimes.com/document.asp?doc_id=1279619
Badauni, A. P. (2015, Agustus 9). Akun Palsu di Media Sosial Jadi Provokator Pilkada Pangkajene Kepulauan. [Online]. Retrieved Agustus 10, 2015,
from Tempo. Co Nasional:
http://nasional.tempo.co/read/news/2015/08/09/058690344/akun-palsu-di-media-sosial-jadi-provokator-pilkada-pangkajene-kepulauan
Damar, A. M. (2015, Desember 17). Kasus diskon palsu di harbolnas lazada akui kecolongan [Online]. Retrieved Desember 19, 2015, from liputan6.com: http://tekno.liputan6.com/read/2392408/kasus-diskon-palsu-di-harbolnas-lazada-akui-kecolongan
Easttom, C. (2015). Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York: McGraw-Hill Education.
El Ghafar, A., Rohiem, A., Diaa, A., & Mohammed, F. (2009). Generation of AES Key Dependent S-Boxes using RC4 Algorithm. 13th International Conference on Aerospace Sciences & Aviation Technology, 1-9.
Ellminaam, D., Kader, H., & Hadhoud, M. (2009). Performance Evaluation of Symmentric Encryption Algorithms. Communication of the IBIMA Volume 8, ISSN: 1943-7765, 58-64.
Frehner, C. (2008). Email, SMS, MMS : The Linguistic Creative of Asynchronous Discourse in The New Media Age. Bern: International Academic Publishers.
International Organization for Standardization. (2005). ISO/IEC 17799:2005.
95
95 Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
Kemp, S. (2015, Januari 21). Digital, Social & Mobile in 2015. Retrieved Februari 19, 2016, from We Are Social: http://wearesocial.sg/blog/2015/01/digital-social-mobile-2015/
Kenny, C. (2005). Random Number Generators : An Evaluation and Comparison of Random.org and Some Commonly Used Generators. Dublin: The Distributed System Group, Computer Science Department, TDC.
Killmeyer, J. (2006). Information Security Architecture. Florida: Auerbach Publications.
Kim, M. J., Lee, B. H., Kim, S. J., & Won, D. H. (2009). Weakness and Improvments of a One-time Password Authentication Scheme.
International Journal of Future Generation Communication and Networking Vol. 2, No. 4, 29-39.
Krishnamurthy, G., & Ramaswamy, D. (2008). Making AES Stronger: AES with Key Dependent S-Box. International Journal of Computer Science and Network Security, Vol.8 No.9, 388-398.
Kumar, M. (2008). Cryptography and Network Security. Meerut: Krishna Prakasha Media.
Kumar, M., & Karthikeyan, D. (2012). Investigating Efficiency of Blowfish and Rijndael (AES) Algorithm. I. J. Computer Network and Information Security, 22-28.
Kurniawan, Y. (2004). Kriptografi Keamanan Internet dan Jaringan Komunikasi.
Bandung: Penerbit Informatika.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. Boca Raton: CRC Press.
Munir, R. (2004). Advance Encryption Standard. Bandung: Institut Teknologi Bandung.
Munir, R. (2006). Kriptografi. Bandung: Penerbit Informatika.
Neal, D. (2011, Agustus 17). AES encryption is cracked: Researchers find a weakness in the algorithm. Retrieved Desember 19, 2015, from The INQUIRER: http://www.theinquirer.net/inquirer/news/2102435/aes-encryption-cracked
96
96 Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
Panji, A. (2015, Juni 30). Lazada: iPhone 6 Plus jadi Sabun Dibeli Lewat Merchant. Retrieved Oktober 10, 2015, from CNN Indonesia:
http://www.cnnindonesia.com/teknologi/20150630102701-185-63213/lazada-iphone-6-plus-jadi-sabun-dibeli-lewat-merchant/
Parmar, H., Nainan, N., & Thaseen, S. (2012). Generation of Secure One-time Password Based on Image Authentication. Computer Science & Information Technology, 195-206.
Pitt, C., & John Wieland. (2013). Essential Information Security. Zaltbommel: Van Haren Publishing.
Rohan, A. (2011). Advance Encryption Standard (AES) Modes of Operation.
Maryland: University of Maryland.
Sarno, R., & Irsyat, I. (2009). Sistem Manajemen Keamanan Informasi berbasis ISO 27001. Surabaya: ITS Press.
Schneier, B. (1996). Applied Cryptography – Protocols, Algorithms and Source Code in C. New York: John Wiley and Sons, Inc.
Sediyono, E., Santoso, K. I., & Suhartono. (2013). Secure Login by Using One-time Password Authentication Based on MD5 Hash Encrypted SMS.
International Conference on Advances in Computing, Communication and Informatics, 1604-1608.
Setiawan, A., & Sukmawati, N. E. (2014, Juni 21). Ribuan "Akun Robot" di Media Sosial Ramaikan Kampanye Pilpres. Retrieved Agustus 10, 2015, from Politik, Viva News: http://politik.news.viva.co.id/news/read/514723-ribuan--akun-robot--di-media-sosial-ramaikan-kampanye-pilpres
Setyanugraha, D., & Akbar, S. (2015). Modified ShifRow AES with RoundKey.
Makalah IF 4020 Kriptografi.
Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal.
Simarmata, J. (2010). Rekayasa Web. Yogyakarta: C.V. Andi Offset. Sommerville, I. (2011). Software Enginering 9th Edition. Pearson.
Sonjaya, I. (2007). Uji Homogenitas Data Iklim Di Statsiun Klimatologi Banjarbaru. Banjarbaru: Stasiun Klimatologi Banjarbaru.
97
97 Iman Muhamad Ramadhan, 2016
IMPLEMENTASI KRIPTOGRAFI AES DAN OTP DALAM MEMBANGKITKAN KODE OTENTIKASI UNTUK AKTIVASI ONLINE MEMBER BARU YANG DIKIRIM MELALUI SMS
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
Stiawan, D. (2005). Sistem Keamanan Komputer. Jakarta: PT. Elex Media Komputindo.
Sulaiman, S., Muda, Z., & Juremi, J. (2012). The New Approach of Rijndael Key Schedule. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Cnference on, 23-27.
Sulianta, F. (2009). Teknik Mengoptimalkan Password. Jakarta: PT. Elex Media Komputindo.
Suryadhi, A. (2014, Juni 23). Debat Capres, Akun Bot Gerilya Berkicau. Retrieved Agustus 10, 2015, from Detik iNet: http://inet.detik.com/read/2014/06/23/105421/2616068/398/debat-capres-akun-bot-gerilya-berkicau
Sutiana, J. (2013). Implementasi Kriptografi Diffie-Hellman Dan RSA Dalam Otentikasi Token Pada Internet Banking. Bandung: Program Studi Ilmu Komputer, Universitas Pendidikan Indonesia.
Usman, & Nurdin. (2002). Konteks Implementasi Berbasis Kurikulum. Jakarta: PT. Raja Grafindo Persada.
Wali, M. F., & Rehan, M. (2005). Effective Coding and Performance Evaluation of the Rijndael Algorithm (AES). Karachi: NED University of Engineering and Technology.
Wicaksono, R. (2009, Juli 27). Memahami Cara Kerja Token Internet Banking. Retrieved Agustus 31, 2015, from Ilmu Hacking, Hackingology, Computer Security Blog: http://www.ilmuhacking.com/web-security/memahami-cara-kerja-token-internet-banking/
Wiratri, L. (2015, Juli 1). Kasus Lazada Berikan Dampak Buruk bagi E-Commerce. Retrieved Oktober 6, 2015, from Okezone Techno: http://techno.okezone.com/read/2015/07/01/207/1174356/kasus-lazada-berikan-dampak-buruk-bagi-e-commerce