IMPLEMENTASI ALGORITMA TEA DAN FUNGSI HASH MD4 UNTU ENKRIPSI DAN DEKRIPSI DATA
Abstract
Full Text:
PDFReferences
Bruce Schneier, Applied Crytography, Second Edition, John Willey and Sons Inc., 1996. David Khan, The Codebreaker, The Macmillan Company,1973.
Jusuf Kurniawan, Kriptografi, Keamanan Internet dan Jaringan
Komunikasi, Penerbit Informatika Bandung, 2004.
Jennifer Seberpy, Jojef Pieprzyk, Cryptography : An Introduction to Computer Security. Menezes, A. et al, Handbook Of Applied Cryptography , IBCRC Press, 1996.
Rinaldi Munir, Kriptografi, Penerbit Informatika, 2006.
William Stallings, Cryptography and Network Security: Principles and Practices , 3rd edition, Pearson Education International, 2003.
http://edipermadi.files.wordpress.com/2008/06/tea-spec.pdf . Di akses pada tanggal 9 Februari 2012 14.00 WIB
DOI: https://doi.org/10.29103/techsi.v5i1.143
Article Metrics
Abstract Views : 390 timesPDF Downloaded : 41 times
Refbacks
- There are currently no refbacks.
TECHSI Journalindexed by:
TECHSI Journalis a member of:
© Copyright of Journal TECHSI, (e-ISSN:2614-6029, p-ISSN:2302-4836).