Data Security Application using Rivest Cipher 6 (RC 6) Algorithm
(1) Sekolah Tinggi Ilmu Manajemen Sukma
Full Text:
PDFReferences
S. D. Shyamlee and M. Phil, “"Use of Technology in English Language Teaching and Learning": An Analysis.”
R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things architecture, possible applications and key challenges,” in Proceedings - 10th International Conference on Frontiers of Information Technology, FIT 2012, 2012, pp. 257–260.
D. Asteria, E. Suyanti, D. Utari, and D. Wisnu, “Model of Environmental Communication with Gender Perspective in Resolving Environmental Conflict in Urban Area (Study on the Role of Women’s Activist in Sustainable Environmental Conflict Management),” Procedia Environ. Sci., vol. 20, pp. 553–562, 2014.
J. A. Alzubi et al., “Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud,” Measurement, vol. 150, p. 107077, Jan. 2020.
R. Rahim, E. F. Armay, D. Susilo, R. F. Marta, and A. Alanda, “Cloud computing security issues and possibilities,” Int. J. Eng. Adv. Technol., vol. 8, no. 6 Special Issue, pp. 927–931, Aug. 2019.
A. L. Biel, “How brand image drives brand equity,” J. Advert. Res., vol. 32, pp. RC6–RC12, 1992.
I. Halik and Y. Prayudi, “Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data,” Stud. Dan Anal. Algoritm. Rivest Code 6 Dalam Enkripsi/Dekripsi Data, vol. 6, no. D, pp. 149–158, 2005.
T. Iwata and K. Kurosawa, “On the pseudorandomness of the AES Finalists - RC6 and serpent,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001.
H. E. H. Ahmed, H. M. Kalash, and O. S. Farag Allah, “Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images,” in 2007 International Conference on Electrical Engineering, ICEE, 2007.
E. Bertino and E. Ferrari, “Information security,” in The Practical Handbook of Internet Computing, 2004.
W. Stallings, Network security essentials : applications and standards. 2011.
W. Stallings, “Cryptography and Network Security Principles and Practices,” 4th Editio., .
J. Hoffstein, J. C. Pipher, and J. H. Silverman, An Introduction to Mathematical Cryptography. Springer, 2008.
M. Ebrahim, S. Khan, and U. Bin Khalid, “Symmetric Algorithm Survey: A Comparative Analysis,” vol. 61, no. 20, pp. 12–19, 2014.
DOI: https://doi.org/10.34007/incoding.v5i1.775
Article Metrics
Abstract view : 14 timesPDF - 3 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 INCODING: Journal of Informatics and Computer Science Engineering