Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital
Abstract
Full Text:
PDFReferences
A. dan D. S. M. Ghosh, “Review Paper on Secure Hash Algorithm With Its Variants,” International Journal of Innovation in Modern Engineering & Science (IJTIMES), vol. III, no. 05, pp. 1-7, 2017.
D. Rachamawati, J. T. Tarigan dan A. B. C. Ginting, “A Comparative Study of Message Digest 5 (MD5) and SHA-256 Algorithm,” dalam 2nd International Conference on Computing and Applied Informatics 2017, Medan, 2018.
T. Kirubakaran, K. Srinivasan, P. J. Vignesh dan V. V. A, “Implementation of Secure Hash Algorithm-256,” International Journal of Engineering Science and Computing (IJESC), pp. 5785-5788, 2017.
T. Sutoyo, E. Mulyanto, V. Suhartono, O. N. Nurhayati dan W. , Teori Pengolahan Citra Digital, Yogyakarta: Andi, 2009.
D. Putra, Pengolahan Citra Digital, Yogyakarta: Andi, 2010.
R. Munir, Kriptografi, Bandung: Informatika Bandung, 2006.
Y. Kurniawan, Kriptografi Keamanan Internet dan Jaringan Komunikasi, Bandung: Informatika, 2017.
F. I. P. Standards Publications, “Secure Hash Standard,” National Institute of Standards and Technology, Amerika Serikat, 2002.
DOI: http://dx.doi.org/10.30645/senaris.v1i0.20
Refbacks
- There are currently no refbacks.