Main Article Content
Abstract
Keywords
Article Details
All articles published in the Eigen Mathematics Journal will be available for free reading and downloading. The license applied to this journal is Creative Commons Attribution-Non-Commercial-Share Alike (CC BY-NC-SA).
References
- Agustina, E. R., & Kurniati, A. (2009). Pemanfaatan Kriptografi dalam Mewujudkan Keamanan Informasi pada e-voting di Indonesia. Seminar Nasional Informatika 2009 (SemnasIF 2009) UPN “Veteran†Yogyakarta, 23 Mei 2009, 2009(semnasIF), 22–28.
- Anton, H., & Rorres, C. (2014). Elementary Linier Algebra, Application Version, 11 th Edition (11 th). Wiley.
- Cop, P., & Purnama, R. A. (2015). Sistem Keamanan E-Voting Menggunakan Algoritma Kode ASCII. 1(1), 84–95.
- Dawahdeh, Z. E., Yaakob, S. N., & Razif bin Othman, R. (2018). A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher. Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2017.06.004
- Hamdani, D., & Rachman, S. (2018). Encryption and Decryption of Text using Hill Cipher Modified. 3rd International Conference on Science and Technology, Mataram, December 10, 2018, 227–25.
- Handayani, E., Pratitis, W. L., Nur, A., Mashuri, S. A., & Nugroho, B. (2017). PERANCANGAN APLIKASI KRIPTOGRAFI BERBASIS WEB DENGAN ALGORITMA DOUBLE CAESAR CIPHER MENGGUNAKAN TABEL ASCII. 241–246.
- Hernawati, K. (2006a). Implementasi Cipher Hill pada kode ASCII dengan Memanfaatkan Digit Desimal Bilangan Euler. Seminar Nasional MIPA 2006 Dengan Tema “Penelitian, Pendidikan, Dan Penerapan MIPA Serta Peranannya Dalam Peningkatan Keprofesionalan Pendidik Dan Tenaga Kependidikan†Yang Diselenggarakan Oleh Fakultas MIPA UNY, Yogyakarta Pada Tanggal 1 Agustus 2006.
- Hernawati, K. (2006b). Implementasi Cipher Viginere pada kode ASCII dengan memanfaatkan Digit Desimal Bilangan Euler. 1–9.
- Injosoft. (2020). ASCII Code - The extended ASCII table (pp. 1–7). http://www.ascii-code.com/
- Munir, R. (2008). Pengantar Ilmu Kriptografi. Penerbit Andi. https://doi.org/10.1017/CBO9781107415324.004
- Munir, R. (2016). Matematika Diskrit. Informatika.
- Pujari, S. K., Bhattacharjee, G., & Bhoi, S. (2018). A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence. Procedia Computer Science. https://doi.org/10.1016/j.procs.2017.12.023
- Reddy, K. A., Vishnuvardhan, B., Madhuviswanatham, & Krishna, A. V. N. (2012). A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology, 4, 114–118. https://doi.org/10.1016/j.protcy.2012.05.016
- Rosen, K. H. (2011). Elementary Number Theory & Its Applications (Sixth Edition) (Sixth Edit). Addison-Wesley is an imprint of Pearson.
- Stallings, W. (2011). CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION. Prentice Hall.
- Tutorial Point. (2014). Cyptography tutorial. Organizational Behavior, 1–305.
- Ubhad, S. A., Chaubey, P. N., & Dubey, P. S. P. (2015). Advanced ASCII Based Cryptography Using Matrix Operation , Palindrome Range , Unique id. 4(8), 66–71.
- Wikipedia contributors. (2020). ASCII. Wikipedia, The Free Encyclopedia.
References
Agustina, E. R., & Kurniati, A. (2009). Pemanfaatan Kriptografi dalam Mewujudkan Keamanan Informasi pada e-voting di Indonesia. Seminar Nasional Informatika 2009 (SemnasIF 2009) UPN “Veteran†Yogyakarta, 23 Mei 2009, 2009(semnasIF), 22–28.
Anton, H., & Rorres, C. (2014). Elementary Linier Algebra, Application Version, 11 th Edition (11 th). Wiley.
Cop, P., & Purnama, R. A. (2015). Sistem Keamanan E-Voting Menggunakan Algoritma Kode ASCII. 1(1), 84–95.
Dawahdeh, Z. E., Yaakob, S. N., & Razif bin Othman, R. (2018). A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher. Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2017.06.004
Hamdani, D., & Rachman, S. (2018). Encryption and Decryption of Text using Hill Cipher Modified. 3rd International Conference on Science and Technology, Mataram, December 10, 2018, 227–25.
Handayani, E., Pratitis, W. L., Nur, A., Mashuri, S. A., & Nugroho, B. (2017). PERANCANGAN APLIKASI KRIPTOGRAFI BERBASIS WEB DENGAN ALGORITMA DOUBLE CAESAR CIPHER MENGGUNAKAN TABEL ASCII. 241–246.
Hernawati, K. (2006a). Implementasi Cipher Hill pada kode ASCII dengan Memanfaatkan Digit Desimal Bilangan Euler. Seminar Nasional MIPA 2006 Dengan Tema “Penelitian, Pendidikan, Dan Penerapan MIPA Serta Peranannya Dalam Peningkatan Keprofesionalan Pendidik Dan Tenaga Kependidikan†Yang Diselenggarakan Oleh Fakultas MIPA UNY, Yogyakarta Pada Tanggal 1 Agustus 2006.
Hernawati, K. (2006b). Implementasi Cipher Viginere pada kode ASCII dengan memanfaatkan Digit Desimal Bilangan Euler. 1–9.
Injosoft. (2020). ASCII Code - The extended ASCII table (pp. 1–7). http://www.ascii-code.com/
Munir, R. (2008). Pengantar Ilmu Kriptografi. Penerbit Andi. https://doi.org/10.1017/CBO9781107415324.004
Munir, R. (2016). Matematika Diskrit. Informatika.
Pujari, S. K., Bhattacharjee, G., & Bhoi, S. (2018). A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence. Procedia Computer Science. https://doi.org/10.1016/j.procs.2017.12.023
Reddy, K. A., Vishnuvardhan, B., Madhuviswanatham, & Krishna, A. V. N. (2012). A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology, 4, 114–118. https://doi.org/10.1016/j.protcy.2012.05.016
Rosen, K. H. (2011). Elementary Number Theory & Its Applications (Sixth Edition) (Sixth Edit). Addison-Wesley is an imprint of Pearson.
Stallings, W. (2011). CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, FIFTH EDITION. Prentice Hall.
Tutorial Point. (2014). Cyptography tutorial. Organizational Behavior, 1–305.
Ubhad, S. A., Chaubey, P. N., & Dubey, P. S. P. (2015). Advanced ASCII Based Cryptography Using Matrix Operation , Palindrome Range , Unique id. 4(8), 66–71.
Wikipedia contributors. (2020). ASCII. Wikipedia, The Free Encyclopedia.
