Text Data Security Using Stream Cipher Algorithm
(1) Universitas Cenderawasih, Indonesia
(2) Universitas Cenderawasih, Indonesia
(3) Universitas Cenderawasih, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PdfReferences
Supiyanto and T. Suparwati, “Penerapan Matriks Invers Tergeneralisasi (MIT) Untuk Keamanan Data Pada Sandi Hill,” Indonesia, 2020.
N. Rajender Reddy, C. Aravind Kumar, P. Rajkumar, and V. Velde, “Public key authentication schemes in asymmetric cryptography,” Mater. Today Proc., no. xxxx, pp. 1–5, 2021, doi: 10.1016/j.matpr.2021.02.172.
R. Munir, “Kriptografi,” Inform. Bandung, 2006.
M. Jumeidi, D. Triyanto, and Y. Brianorman, “Implementasi Algoritma Kriptografi Vernam Cipher Berbasis Fpga,” Coding J. Komput. dan Apl., vol. 4, no. 1, 2016, doi: http://dx.doi.org/10.26418/coding.v4i1.13329.
Y. Irnanda, “Enkripsi dan Dekripsi Dengan Menggunakan Metode Kriptografi Vernam Cipher (XOR),” Kumpul. Karya Ilm. Mhs. Fak. sains dan Tekhnologi, vol. 1, no. 1, p. 47, 2019.
DOI: https://doi.org/10.30645/ijistech.v6i5.278
Refbacks
- There are currently no refbacks.
Jumlah Kunjungan:
Published Papers Indexed/Abstracted By: