• Tidak ada hasil yang ditemukan

(1)38 38 Teknik Informatika - ITI DAFTAR PUSTAKA Bellare, M., & Rogaway, P

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "(1)38 38 Teknik Informatika - ITI DAFTAR PUSTAKA Bellare, M., & Rogaway, P"

Copied!
2
0
0

Teks penuh

(1)

38

38

Teknik Informatika - ITI

DAFTAR PUSTAKA

Bellare, M., & Rogaway, P. (2005). Introduction to Modern Cryptography. Davis:

University of California at Davis. Retrieved from

https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf Blum, L., Blum, M., & Shub, M. (1986). Siam J. Comput. A Simple Unpredictable

Pseudo-Random Number, -.

Bodewes, M. (2014, April 1). Use of “SHA1PRNG” in SecureRandom Class. -, -, -.

Retrieved 08 06, 2021, from https://stackoverflow.com/questions/12726434/use- of-sha1prng-in-securerandom-class

Chao, H.-C., & Fan, T.-Y. (2017). Displays 49. XOR-based progressive visual secret sharing using generalized random grids, 6-15. doi:10.1016/j.displa.2017.05.004 detikcom, T. (2020, April 26). Kapan Sebenarnya Corona Pertama Kali Masuk RI?

Retrieved from detikNews: https://news.detik.com/berita/d-4991485/kapan- sebenarnya-corona-pertama-kali-masuk-ri

Dixit, J. B., & Kumar, R. (2007). Structured System Analysis and Design. Daryaganj:

Laxmi Publications (P) LTD.

Etem, T., & Kaya, T. (2020). Applied Acoustics 170. Self-generated encryption model of acoustics, 107481. doi:10.1016/j.apacoust.2020.107481

Forshaw, J. (2017). Attacking Network Protocols. San Francisco: No Starch Press.

Graphics, C. (1997, - -). How Lavarand Works. Retrieved from -:

https://web.archive.org/web/19971210213501/http://lavarand.sgi.com/cgi- bin/how.cgi

Humas. (2021, Juli 9). Berlaku Mulai 12 Juli, PPKM Darurat Diberlakukan di 15 Kab/Kota Luar Jawa-Bali. Retrieved from Sekretariat Kabinet Republik Indonesia: https://setkab.go.id/berlaku-mulai-12-juli-ppkm-darurat- diberlakukan-di-15-kab-kota-luar-jawa-bali/

Huo, F., & Gong, G. (2015). IEEE Transactions On Electromagnetic Compability. XOR Encryption Versus Phase Encryption, an In-Depth Analysis, -.

id3.org. (2012, Oktober 08). mp3Frame. Retrieved from ID3.org:

https://id3.org/mp3Frame

Imran, O. A., Yousif, S. F., Hameed, I. S., Abed, W. N.-D., & Hammid, A. T. (2020).

Procedia Computer Science 167. Implementation of El-Gamal algorithm for speech signals encryption and decryption, 1028-1037.

doi:10.1016/j.procs.2020.03.402

Jaiswal, R. C. (2009). Audio-Video Engineering. Pune: Nirali Prakashan.

(2)

39

39

Teknik Informatika - ITI

Jayaraj, A., Gujarathi, N. N., Venkatesh, I., & Sanyal, A. (2019). IEEE Transactions on Circuits and System II: Express Briefs. True Random Number Generator Based on SAR ADC, 1. doi:10.1109/TCSII.2019.2949775

Kumar, S., Kumar, M., Budhiraja, R., Das, M. K., & Singh, S. (2018). Journal of Information Security and Applications43. A cryptographic model for better information security, 123-138. doi:10.1016/j.jisa.2018.10.011

Mohammed, M. J. (2019). Academic Journal of Nawroz University. PRNG Implementation Based on Chaotic Neural Network (CNN), 158-163.

doi:10.25007/ajnu.v8n4a459

Oracle. (2021, - -). Java Cryptography Architecture Oracle Providers Documentation.

Retrieved from Oracle:

https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.ht ml

Renza, D., Mendoza, S., & Ballesteros L, D. M. (2019). Journal of Information Security and Applications. High-uncertainty audio signal encryption based on the Collatz conjecture, 62-69. doi:10.1016/j.jisa.2019.02.010

Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., . . . Vo, S. (2010, April -). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Gaithersburg, Maryland, United States. doi:https://doi.org/10.6028/NIST.SP.800-22r1a

Stallings, W. (2011). Cryptography And Network Security. Hoboken: Prentice Hall.

Stipčević, M., & Koç, Ç. K. (2014). True Random Number Generator. In Ç. K. Koç, Open Problems in Mathematics and Computational Science (pp. 275-315). Zug:

Springer, Cham. doi:https://doi.org/10.1007/978-3-319-10683-0

WHO. (2020, January 12). Novel Coronavirus – China. Retrieved from World Health Organization: https://www.who.int/csr/don/12-january-2020-novel-coronavirus- china/en/

Referensi

Dokumen terkait

In order to enhance learners’ thinking, teacher training institutions, classroom teachers, parents, educational planners, researchers, and learners themselves must