SlideShare a Scribd company logo
1 of 4
Itani, M.; Diab, H., 2004, Reconfigurable Computing for RC6 Cryptography, 2004 IEEE/ACS International
Conference on Pervasive Services (ICPS'04), pp. 121-127.
Prayudi, Y.; Halik, I., 2005, Studi Dan AnalisisAlgoritmaRivest Code 6 (Rc6) DalamEnkripsi/Dekripsi Data,
Seminar NasionalTeknologiInformasi 2005 (SNATI 2005), pp. 149 – 158.
Rivest, R., L.; Robshaw, M.J.B; Sidney, R.; Yin, Y.L., 1998, The RC6 Block Cipher, RCA Laboratories.
Rudianto, AnalisisKeamananAlgoritmaKriptografi RC6, JurusanTeknikInformatika ITB, Bandung
Anupam, V.; Mayer, A., 1998, Secure Web Scripting, IEEE Internet Computing, pp. 46-55.
WiwitSiswoutomo (2007), “Fundamental of PHP Security”, Jakarta, Elex Media Komputindo.
DonyAriyus (2008), “PengantarIlmuKriptografi, Teori, Analisis, danImplementasi”, Yogyakarta, Andi
Offset.
Alan G.Konheim (2007), “Computer Security and Cryptograhy”, New Jersey, John Wiley & Sons, Inc.
Schmeh, Klaus. 2003, Cryptography and Public Key Infrastructure on the Internet, Willey &Sons, inc.
Soohyun, et al. 2003, An Efficient Hybrid Cryptosystem Providing Authentication for Sender’s Identity.
Sungkyunkwan University Korea.
I PutuHerryawan.Juli2010 , APLIKASI KEAMANAN DATA MENGGUNAKAN METODA KRIPTOGRAFI GOST ,
Jurnal TSI, Vol.1, No.2.
Nicolas Courtois, MichaÃlMisztal. 2011, Aggregated Di®erentials and Cryptanalysis ofPP-1 and GOST, To
app ear in 11th Central European Conference on Cryptology,will be held in Debrecen, Hungary.
Nicolas Courtois. 2011, Security Evaluation of GOST 28147-89 In View Of InternationalStandardisation,
do cumento±cially submitted to ISO in May 2011, In CryptologyePrint Archive, Report 2011/211. 1 May
2011, http://eprint.iacr.org/2011/211.
Nicolas Courtois, MichaÃlMisztal. 14 June 2011: Di®erential Cryptanalysis of GOST, In Cryptol-ogyePrint
Archive, Rep ort 2011/312, http://eprint.iacr.org/2011/312.
Fleischmann Ewan, Gorski Michael, Huehne Jan-Hendrik, Lucks Stefan. 2009, Key re-covery attack on full
GOST block cipher with zero time and memory, Publishedas ISO/IEC JTC 1/SC 27 N8229.
Vitaly V. Shorin, Vadim V. Jelezniakov and Ernst M. Gabidulin.2001, Linear and Dif-ferential Cryptanalysis
of Russian GOST, Preprint submitted to Elsevier Preprint.
I. A. Zabotin, G. P. Glazkov, V. B. Isaeva.1989, Cryptographic Protection for Information Processing
Systems, Government Standard of the USSR, GOST 28147-89,Government Committee of the USSR for
Standards,. In Russian, translatedto English in http://www.autochthonous.org/crypto/gosthash.tar.gz
VasilyDolmatov.March 2010, GOST 28147-89 encryption, decryption andMAC algorithms, IETF. ISSN:
2070-1721. Editor, RFC 5830, http://tools.ietf.org/html/rfc5830
TakanoriIsobe. 2011, A Single-Key Attack on the Full GOST Block Cipher, In FSE2011, Fast Software
Ecnryption, Springer LNCS.
Bruce Schneier. 1996, Section 14.1 GOST, in Applied Cryptography, Second Edition,John Wiley and Sons,
ISBN 0-471-11709-9.
Bruce Schneier.1995, “The GOST encryption algorithm,” Dr. Dobb’s Journal, Vol. 20, No.1, pp. 123-124.
Nawa l El-F ishawy and Osama M.AbuZaid. 2007, Quality of Encryption Measurement of BitmapImages
with RC 6, MRC 6, and Rijndael BlockCipher Algorithms, International Journal of Network Security, Vo l.5,
No .3 , PP.241–251.

Secaraumum data dikategorikanmenjadidua, yaitu data yang bersifatrahasiadan data yang
tidakbersifatrahasia. Data yang tidakbersifatrahasiabiasanyatidakakanterlaludiperhatikan. Yang
sangatperludiperhatikanadalah
data
yang
bersifatrahasia,
dimanasetiapinformasi
yang
adadidalamnyaakansangatberhargabagipihak
yang
membutuhkankarena
data
tersebutdapatdenganmudahdigandakan.
Untukmendapatkaninformasididalamnya,
biasanyadilakukanberbagaicara yang tidaksah. Sistemkeamanan data dankerahasiaan data
merupakansalahsatuaspekpentingdalamperkembanganduniatelekomunikasi,khususnyakomunikasi yang
menggunakankomputerdanterhubungkejaringan
internet.
Dalamperancanganpenelitianiniakandibahasanalisiskriptografi
yang
ditekankanpadapenggabunganmetode RC6 danmetode GOST untukmengenkripsidanmendekripsi file.
Alan G.Konheim (2007), “Computer Security and Cryptograhy”, New Jersey, John Wiley & Sons, Inc.
Anupam, V.; Mayer, A., 1998, Secure Web Scripting, IEEE Internet Computing, pp. 46-55.
Bruce Schneier. 1996, Section 14.1 GOST, in Applied Cryptography, Second Edition, John Wiley and Sons,
ISBN 0-471-11709-9.
Bruce Schneier.1995, “The GOST encryption algorithm,” Dr. Dobb’s Journal, Vol. 20, No.1, pp. 123-124.
DonyAriyus (2008), “PengantarIlmuKriptografi, Teori, Analisis, danImplementasi”, Yogyakarta, Andi
Offset.
Fleischmann Ewan, Gorski Michael, Huehne Jan-Hendrik, Lucks Stefan. 2009, Key re-covery attack on full
GOST block cipher with zero time and memory, Published as ISO/IEC JTC 1/SC 27 N8229.
I. A. Zabotin, G. P. Glazkov, V. B. Isaeva. 1989, Cryptographic Protection for Information Processing
Systems, Government Standard of the USSR, GOST 28147-89, Government Committee of the USSR for
Standards,. In Russian, translated to English in http://www.autochthonous.org/crypto/gosthash.tar.gz
I PutuHerryawan.Juli2010 , APLIKASI KEAMANAN DATA MENGGUNAKAN METODA KRIPTOGRAFI GOST ,
Jurnal TSI, Vol.1, No.2.
Itani, M.; Diab, H., 2004, Reconfigurable Computing for RC6 Cryptography, 2004 IEEE/ACS International
Conference on Pervasive Services (ICPS'04), pp. 121-127.
Nawa l El-F ishawy and Osama M.AbuZaid. 2007, Quality of Encryption Measurement of Bitmap Images
with RC 6, MRC 6, and Rijndael Block Cipher Algorithms, International Journal of Network Security, Vo
l.5, No .3 , PP.241–251.
Nicolas Courtois, MichaÃlMisztal. 2011, Aggregated Di®erentials and Cryptanalysis of PP-1 and GOST, To
app ear in 11th Central European Conference on Cryptology, will be held in Debrecen, Hungary.
Nicolas Courtois. 2011, Security Evaluation of GOST 28147-89 In View Of International Standardisation,
do cumento±cially submitted to ISO in May 2011, In Cryptology ePrint Archive, Report 2011/211. 1 May
2011, http://eprint.iacr.org/2011/211.
Nicolas Courtois, MichaÃlMisztal. 14 June 2011: Di®erential Cryptanalysis of GOST, In Cryptol-ogyePrint
Archive, Rep ort 2011/312, http://eprint.iacr.org/2011/312.
Prayudi, Y.; Halik, I., 2005, Studi Dan AnalisisAlgoritmaRivest Code 6 (Rc6) DalamEnkripsi/Dekripsi Data,
Seminar NasionalTeknologiInformasi 2005 (SNATI 2005), pp. 149 – 158.
Rivest, R., L.; Robshaw, M.J.B; Sidney, R.; Yin, Y.L., 1998, The RC6 Block Cipher, RCA Laboratories.
Rudianto, AnalisisKeamananAlgoritmaKriptografi RC6, JurusanTeknikInformatika ITB, Bandung
Schmeh, Klaus. 2003, Cryptography and Public Key Infrastructure on the Internet, Willey & Sons, inc.
Soohyun, et al. 2003, An Efficient Hybrid Cryptosystem Providing Authentication for Sender’s Identity.
Sungkyunkwan University Korea.

TakanoriIsobe. 2011, A Single-Key Attack on the Full GOST Block Cipher, In FSE 2011, Fast Software
Ecnryption, Springer LNCS.
VasilyDolmatov.March 2010, GOST 28147-89 encryption, decryption and MAC algorithms, IETF. ISSN:
2070-1721. Editor, RFC 5830, http://tools.ietf.org/html/rfc5830
Vitaly V. Shorin, Vadim V. Jelezniakov and Ernst M. Gabidulin. 2001, Linear and Dif-ferential
Cryptanalysis of Russian GOST, Preprint submitted to Elsevier Preprint.
WiwitSiswoutomo (2007), “Fundamental of PHP Security”, Jakarta, Elex Media Komputindo.

More Related Content

More from dj96

Excel spreadsheet dian uas
Excel spreadsheet dian uasExcel spreadsheet dian uas
Excel spreadsheet dian uasdj96
 
Uas computer application
Uas computer applicationUas computer application
Uas computer applicationdj96
 
Analisis celular y la taxonomia
Analisis celular y la taxonomiaAnalisis celular y la taxonomia
Analisis celular y la taxonomiadj96
 
Whatifstudentsdon’tdohomework(word2003) VVVV
Whatifstudentsdon’tdohomework(word2003) VVVVWhatifstudentsdon’tdohomework(word2003) VVVV
Whatifstudentsdon’tdohomework(word2003) VVVVdj96
 
Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)dj96
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)dj96
 
Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)dj96
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Ipr presentasi
Ipr presentasiIpr presentasi
Ipr presentasidj96
 
Uas computer application
Uas computer applicationUas computer application
Uas computer applicationdj96
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Housing complaints
Housing complaintsHousing complaints
Housing complaintsdj96
 
Yg
YgYg
Ygdj96
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)dj96
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Uas fkip
Uas fkipUas fkip
Uas fkipdj96
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)dj96
 
Pengumumandiwebsite(rekruitmen saktipeksostksii)
Pengumumandiwebsite(rekruitmen saktipeksostksii)Pengumumandiwebsite(rekruitmen saktipeksostksii)
Pengumumandiwebsite(rekruitmen saktipeksostksii)dj96
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 
Loveisblind
LoveisblindLoveisblind
Loveisblinddj96
 

More from dj96 (20)

Excel spreadsheet dian uas
Excel spreadsheet dian uasExcel spreadsheet dian uas
Excel spreadsheet dian uas
 
Uas computer application
Uas computer applicationUas computer application
Uas computer application
 
Analisis celular y la taxonomia
Analisis celular y la taxonomiaAnalisis celular y la taxonomia
Analisis celular y la taxonomia
 
Whatifstudentsdon’tdohomework(word2003) VVVV
Whatifstudentsdon’tdohomework(word2003) VVVVWhatifstudentsdon’tdohomework(word2003) VVVV
Whatifstudentsdon’tdohomework(word2003) VVVV
 
Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)
 
Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)Form rekruitmendiwebsite(sakti peksostksii)
Form rekruitmendiwebsite(sakti peksostksii)
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Ipr presentasi
Ipr presentasiIpr presentasi
Ipr presentasi
 
Uas computer application
Uas computer applicationUas computer application
Uas computer application
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Housing complaints
Housing complaintsHousing complaints
Housing complaints
 
Yg
YgYg
Yg
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Uas fkip
Uas fkipUas fkip
Uas fkip
 
Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)Whatifstudentsdon’tdohomework(word2003)
Whatifstudentsdon’tdohomework(word2003)
 
Pengumumandiwebsite(rekruitmen saktipeksostksii)
Pengumumandiwebsite(rekruitmen saktipeksostksii)Pengumumandiwebsite(rekruitmen saktipeksostksii)
Pengumumandiwebsite(rekruitmen saktipeksostksii)
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 
Loveisblind
LoveisblindLoveisblind
Loveisblind
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Daftar pustaka

  • 1. Itani, M.; Diab, H., 2004, Reconfigurable Computing for RC6 Cryptography, 2004 IEEE/ACS International Conference on Pervasive Services (ICPS'04), pp. 121-127. Prayudi, Y.; Halik, I., 2005, Studi Dan AnalisisAlgoritmaRivest Code 6 (Rc6) DalamEnkripsi/Dekripsi Data, Seminar NasionalTeknologiInformasi 2005 (SNATI 2005), pp. 149 – 158. Rivest, R., L.; Robshaw, M.J.B; Sidney, R.; Yin, Y.L., 1998, The RC6 Block Cipher, RCA Laboratories. Rudianto, AnalisisKeamananAlgoritmaKriptografi RC6, JurusanTeknikInformatika ITB, Bandung Anupam, V.; Mayer, A., 1998, Secure Web Scripting, IEEE Internet Computing, pp. 46-55. WiwitSiswoutomo (2007), “Fundamental of PHP Security”, Jakarta, Elex Media Komputindo. DonyAriyus (2008), “PengantarIlmuKriptografi, Teori, Analisis, danImplementasi”, Yogyakarta, Andi Offset. Alan G.Konheim (2007), “Computer Security and Cryptograhy”, New Jersey, John Wiley & Sons, Inc. Schmeh, Klaus. 2003, Cryptography and Public Key Infrastructure on the Internet, Willey &Sons, inc. Soohyun, et al. 2003, An Efficient Hybrid Cryptosystem Providing Authentication for Sender’s Identity. Sungkyunkwan University Korea. I PutuHerryawan.Juli2010 , APLIKASI KEAMANAN DATA MENGGUNAKAN METODA KRIPTOGRAFI GOST , Jurnal TSI, Vol.1, No.2. Nicolas Courtois, MichaÃlMisztal. 2011, Aggregated Di®erentials and Cryptanalysis ofPP-1 and GOST, To app ear in 11th Central European Conference on Cryptology,will be held in Debrecen, Hungary. Nicolas Courtois. 2011, Security Evaluation of GOST 28147-89 In View Of InternationalStandardisation, do cumento±cially submitted to ISO in May 2011, In CryptologyePrint Archive, Report 2011/211. 1 May 2011, http://eprint.iacr.org/2011/211. Nicolas Courtois, MichaÃlMisztal. 14 June 2011: Di®erential Cryptanalysis of GOST, In Cryptol-ogyePrint Archive, Rep ort 2011/312, http://eprint.iacr.org/2011/312. Fleischmann Ewan, Gorski Michael, Huehne Jan-Hendrik, Lucks Stefan. 2009, Key re-covery attack on full GOST block cipher with zero time and memory, Publishedas ISO/IEC JTC 1/SC 27 N8229. Vitaly V. Shorin, Vadim V. Jelezniakov and Ernst M. Gabidulin.2001, Linear and Dif-ferential Cryptanalysis of Russian GOST, Preprint submitted to Elsevier Preprint. I. A. Zabotin, G. P. Glazkov, V. B. Isaeva.1989, Cryptographic Protection for Information Processing Systems, Government Standard of the USSR, GOST 28147-89,Government Committee of the USSR for Standards,. In Russian, translatedto English in http://www.autochthonous.org/crypto/gosthash.tar.gz
  • 2. VasilyDolmatov.March 2010, GOST 28147-89 encryption, decryption andMAC algorithms, IETF. ISSN: 2070-1721. Editor, RFC 5830, http://tools.ietf.org/html/rfc5830 TakanoriIsobe. 2011, A Single-Key Attack on the Full GOST Block Cipher, In FSE2011, Fast Software Ecnryption, Springer LNCS. Bruce Schneier. 1996, Section 14.1 GOST, in Applied Cryptography, Second Edition,John Wiley and Sons, ISBN 0-471-11709-9. Bruce Schneier.1995, “The GOST encryption algorithm,” Dr. Dobb’s Journal, Vol. 20, No.1, pp. 123-124. Nawa l El-F ishawy and Osama M.AbuZaid. 2007, Quality of Encryption Measurement of BitmapImages with RC 6, MRC 6, and Rijndael BlockCipher Algorithms, International Journal of Network Security, Vo l.5, No .3 , PP.241–251. Secaraumum data dikategorikanmenjadidua, yaitu data yang bersifatrahasiadan data yang tidakbersifatrahasia. Data yang tidakbersifatrahasiabiasanyatidakakanterlaludiperhatikan. Yang sangatperludiperhatikanadalah data yang bersifatrahasia, dimanasetiapinformasi yang adadidalamnyaakansangatberhargabagipihak yang membutuhkankarena data tersebutdapatdenganmudahdigandakan. Untukmendapatkaninformasididalamnya, biasanyadilakukanberbagaicara yang tidaksah. Sistemkeamanan data dankerahasiaan data merupakansalahsatuaspekpentingdalamperkembanganduniatelekomunikasi,khususnyakomunikasi yang menggunakankomputerdanterhubungkejaringan internet. Dalamperancanganpenelitianiniakandibahasanalisiskriptografi yang ditekankanpadapenggabunganmetode RC6 danmetode GOST untukmengenkripsidanmendekripsi file.
  • 3. Alan G.Konheim (2007), “Computer Security and Cryptograhy”, New Jersey, John Wiley & Sons, Inc. Anupam, V.; Mayer, A., 1998, Secure Web Scripting, IEEE Internet Computing, pp. 46-55. Bruce Schneier. 1996, Section 14.1 GOST, in Applied Cryptography, Second Edition, John Wiley and Sons, ISBN 0-471-11709-9. Bruce Schneier.1995, “The GOST encryption algorithm,” Dr. Dobb’s Journal, Vol. 20, No.1, pp. 123-124. DonyAriyus (2008), “PengantarIlmuKriptografi, Teori, Analisis, danImplementasi”, Yogyakarta, Andi Offset. Fleischmann Ewan, Gorski Michael, Huehne Jan-Hendrik, Lucks Stefan. 2009, Key re-covery attack on full GOST block cipher with zero time and memory, Published as ISO/IEC JTC 1/SC 27 N8229. I. A. Zabotin, G. P. Glazkov, V. B. Isaeva. 1989, Cryptographic Protection for Information Processing Systems, Government Standard of the USSR, GOST 28147-89, Government Committee of the USSR for Standards,. In Russian, translated to English in http://www.autochthonous.org/crypto/gosthash.tar.gz I PutuHerryawan.Juli2010 , APLIKASI KEAMANAN DATA MENGGUNAKAN METODA KRIPTOGRAFI GOST , Jurnal TSI, Vol.1, No.2. Itani, M.; Diab, H., 2004, Reconfigurable Computing for RC6 Cryptography, 2004 IEEE/ACS International Conference on Pervasive Services (ICPS'04), pp. 121-127. Nawa l El-F ishawy and Osama M.AbuZaid. 2007, Quality of Encryption Measurement of Bitmap Images with RC 6, MRC 6, and Rijndael Block Cipher Algorithms, International Journal of Network Security, Vo l.5, No .3 , PP.241–251. Nicolas Courtois, MichaÃlMisztal. 2011, Aggregated Di®erentials and Cryptanalysis of PP-1 and GOST, To app ear in 11th Central European Conference on Cryptology, will be held in Debrecen, Hungary. Nicolas Courtois. 2011, Security Evaluation of GOST 28147-89 In View Of International Standardisation, do cumento±cially submitted to ISO in May 2011, In Cryptology ePrint Archive, Report 2011/211. 1 May 2011, http://eprint.iacr.org/2011/211. Nicolas Courtois, MichaÃlMisztal. 14 June 2011: Di®erential Cryptanalysis of GOST, In Cryptol-ogyePrint Archive, Rep ort 2011/312, http://eprint.iacr.org/2011/312. Prayudi, Y.; Halik, I., 2005, Studi Dan AnalisisAlgoritmaRivest Code 6 (Rc6) DalamEnkripsi/Dekripsi Data, Seminar NasionalTeknologiInformasi 2005 (SNATI 2005), pp. 149 – 158. Rivest, R., L.; Robshaw, M.J.B; Sidney, R.; Yin, Y.L., 1998, The RC6 Block Cipher, RCA Laboratories. Rudianto, AnalisisKeamananAlgoritmaKriptografi RC6, JurusanTeknikInformatika ITB, Bandung Schmeh, Klaus. 2003, Cryptography and Public Key Infrastructure on the Internet, Willey & Sons, inc.
  • 4. Soohyun, et al. 2003, An Efficient Hybrid Cryptosystem Providing Authentication for Sender’s Identity. Sungkyunkwan University Korea. TakanoriIsobe. 2011, A Single-Key Attack on the Full GOST Block Cipher, In FSE 2011, Fast Software Ecnryption, Springer LNCS. VasilyDolmatov.March 2010, GOST 28147-89 encryption, decryption and MAC algorithms, IETF. ISSN: 2070-1721. Editor, RFC 5830, http://tools.ietf.org/html/rfc5830 Vitaly V. Shorin, Vadim V. Jelezniakov and Ernst M. Gabidulin. 2001, Linear and Dif-ferential Cryptanalysis of Russian GOST, Preprint submitted to Elsevier Preprint. WiwitSiswoutomo (2007), “Fundamental of PHP Security”, Jakarta, Elex Media Komputindo.