Sekuritas Sistem Dengan Kriptografi
DOI:
https://doi.org/10.24256/jpmipa.v3i1.216Keywords:
Kriptografi, Kriptosistem, Plaintext, Chippertext, Cryptography, Hellman Knapsack.Abstract
References
Bishop, David, Introduction to Cryptography with Java Applets, Jones and Bartlett Computer Science, 2003
Dony Ariyus, Pengantar Ilmu Kriptografi, 1st Published, 2008
Meyer, Carl H. & Matyas, Stephen M., Cryptography, A New Dimension in Computer Data Security, John Wiley & Sons, 1982.
Rinaldi Munir, Kriptografi, Informatika Bandung, 2006
Rinaldi Munir, Perancangan Algoritma Stream Cipehr dengan Chaos, Institut Teknologi Bandung, 2005.
Stalling, W., Cryptography and Network Security, Principle and Practice 2rdEdition, Pearson Education, Inc., 1998.
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Authors who wish to publish and disseminate their papers with the Al-Khwarizmi : Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam, shall agree to the publishing rights set by Al-Khwarizmi : Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam. Authors understand that they shall assign publication rights as part of the process upon acceptance for publication. The authors agreed that they would transfer certain copyrights to Al-Khwarizmi : Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam. Consecutively, authors still retain some rights to use and share their own published articles without written permission from Al-Khwarizmi : Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam.
Authors granted Al-Khwarizmi : Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam the following rights; (1) the right to publish and provide the manuscripts in all forms and media for publication and dissemination, (2) the authority to enforce the rights in the manuscript, for example in the case of plagiarism or in copyright infringement.
Al-Khwarizmi : Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam will follow COPE's Code of Conduct and Best Practice Guidelines for Journal Editors to protect the research results and take allegations of any infringements, plagiarisms, ethical issues, and frauds should those issues arise. The manuscript is attributed as the authors' work, and is properly identified.