IMPLEMENTASI ALGORITMA TEA DAN FUNGSI HASH MD4 UNTU ENKRIPSI DAN DEKRIPSI DATA
Abstract
Full Text:
PDFReferences
Bruce Schneier, Applied Crytography, Second Edition, John Willey and Sons Inc., 1996. David Khan, The Codebreaker, The Macmillan Company,1973.
Jusuf Kurniawan, Kriptografi, Keamanan Internet dan Jaringan
Komunikasi, Penerbit Informatika Bandung, 2004.
Jennifer Seberpy, Jojef Pieprzyk, Cryptography : An Introduction to Computer Security. Menezes, A. et al, Handbook Of Applied Cryptography , IBCRC Press, 1996.
Rinaldi Munir, Kriptografi, Penerbit Informatika, 2006.
William Stallings, Cryptography and Network Security: Principles and Practices , 3rd edition, Pearson Education International, 2003.
http://edipermadi.files.wordpress.com/2008/06/tea-spec.pdf . Di akses pada tanggal 9 Februari 2012 14.00 WIB
DOI: https://doi.org/10.29103/techsi.v5i1.143
Article Metrics
Abstract Views : 436 timesPDF Downloaded : 44 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2013 Nurdin Nurdin
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indexed by:
© Copyright of Journal TECHSI, (e-ISSN:2614-6029, p-ISSN:2302-4836).
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.