Penggabungan Modifikasi Hill Cipher dan Elliptic Curve Cryptography untuk Meningkatkan Keamanan Pesan
Abstract
Keywords
Full Text:
PDFReferences
Massey, J. L. (1986). Cryptography—A selective survey. Digital Communications, 85, 3-25.
Saeednia, S. (2000). How to make the Hill cipher secure. Cryptologia, 24(4), 353-360.
Agrawal, K. & Gera, A. (2014). Elliptic Curve Cryptography with Hill cipher Generation for Secure Text Cryptosystem. International Journal of Computer Applications, 106(1), 18 – 24.
Hidayat, A. & Alawiyah, T. 2013. Enkripsi dan Dekripsi Teks menggunakan Kriptosistem hill cipher dengan Kunci Matriks Persegi Panjang. Jurnal Matematika Integratif, 9(1), 39-51.
Jacob, B. 1990. Linear Algebra. New York: W.H.Freeman and Company.
Stinson, D. R. 2006. Cryptography Theory and Practice (3¬rd ed.). Boca Raton: CRC Press.
Kumar, D. S., Suneetha CH., & ChandrasekhAR, A. 2012. Encryption of Data Using Elliptic Curve Over Finite Fields. International Journal of Distributed and Parallel System (IJDPS), 3(1), 301-308.
Sembiring, M. B. (2015). Elliptic Curve Cryptography (ECC) Pada Proses Pertukaran Kunci Publik Diffie-Helman. Visipena, 6(1), 25-33.
DOI: https://doi.org/10.17509/jem.v8i2.30743
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Hana Nur Azizah, Rini Marwati, Isnie Yusnitha