Academic literature on the topic 'Data encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data encryption"

1

Riyaz Fathima Abdul and Saravanan Arumugam. "A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity." Advances in Technology Innovation 10, no. 1 (2025): 15–28. https://doi.org/10.46604/aiti.2024.14114.

Full text
Abstract:
The objective of the study is to introduce a novel hybrid encryption scheme, combining both symmetric and asymmetric encryptions with a data shuffling mechanism, to enhance data obfuscation and encryption security. The approach uses RSA for asymmetric encryption and ChaCha20-Poly1305 for symmetric encryption. To increase the complexity, an additional phase involves reorganizing the RSA-encrypted data blocks. Furthermore, symmetric key generation using the key derivation function is employed to generate the key for symmetric encryption through an asymmetric private key. Decryption entails rever
APA, Harvard, Vancouver, ISO, and other styles
2

Kulwinder, Kaur*1 &. Brahmaleen Kaur Sidhu2. "AN HYBRID APPROACH FOR EFFICIENT DATA ENCRYPTION AND DECRYPTION FOR DATA SECURITY IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 9 (2018): 188–93. https://doi.org/10.5281/zenodo.1421045.

Full text
Abstract:
In this paper, a hybrid encryption is proposed using combination of two asymmetric schemes. The existing schemes are lacking in encrypting large data files, there time complexity may worsen with size. In this work the homomorphic algorithm is used along with RSA, to enhance the encryption and decryption time. The evaluation study has been done between AES, 3DES, DES and proposed algorithm on basis of their time complexities. Our proposed work has very least complexity for both encryption and decryption. Proposed scheme is also highly secure as it involves 2 encryption and decryption rounds.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Bingcheng, Dingkang Li, and Mingyuan Zhu. "Application analysis of data encryption technology." Applied and Computational Engineering 50, no. 1 (2024): 199–205. http://dx.doi.org/10.54254/2755-2721/50/20241502.

Full text
Abstract:
Data encryption technology is a key method to secure sensitive data. The privacy and confidentiality of data is protected by encrypting the data, i.e., transforming the original data into a form that cannot be understood without authorization. However, the security of traditional encryption algorithms is gradually challenged with the increase in computing power. Therefore, studying how to apply more advanced encryption techniques has become a current research hotspot. This study aims to analyze the application of data encryption techniques and explore the advantages and applicability of emergi
APA, Harvard, Vancouver, ISO, and other styles
4

SHIBU BAI, Mr SHANE. "Recovering and Analysing Data from Encrypted Devices." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45625.

Full text
Abstract:
Abstract - This paper presents a secure and efficient data protection approach using hybrid encryption, combining symmetric and asymmetric cryptographic methods to enhance both speed and security. Symmetric encryption, specifically the AES algorithm, isutilized for encrypting large volumes of data quickly, while RSA is employed to securely exchange the encryption keys. Alongside this, the work also introduces a data recovery and analysis component designed to retrieve and verify encrypted data, ensuring its integrity and accessibility when needed. The system is developed in Java and tested for
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.

Full text
Abstract:
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate that Oracle 19c TDE offers a seamless and effective solution for data encryption, balancing security and performance. TDE offers functionality that streamlines encryption methods. Transparent Data Encryption (TDE) plays a role in addressing these security concerns by encrypting database files at the storage level ensuring data protection while avoiding th
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Zongwei. "Data Privacy Protection Utilizing Homomorphic Encryption Techniques." Applied and Computational Engineering 135, no. 1 (2025): 1–9. https://doi.org/10.54254/2755-2721/2025.21090.

Full text
Abstract:
In the current era with the rapid development of the Internet, although a variety of technologies have offered convenience to people's lives, numerous problems have arisen regarding the security of individual and collective data, Problems such as data privacy leakage occur continuously. The content of this review is data privacy protection based on homomorphic encryption. Firstly, the basic principle and formula of homomorphic encryption are briefly introduced. Then, the homomorphic encryption-based data privacy protection approach is developed in response to the importance of safeguarding dat
APA, Harvard, Vancouver, ISO, and other styles
7

Benzegane, S., S. Sadoudi, and M. Djeddou. "Hyperchaos-Based Cryptosystem for Multimedia Data Security." Algerian Journal of Signals and Systems 1, no. 1 (2021): 47–58. http://dx.doi.org/10.51485/ajss.v1i1.18.

Full text
Abstract:
In this paper, we present a software development of multimedia streaming encryption using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate keystream for encrypting and decrypting real-time multimedia data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme through image and audi
APA, Harvard, Vancouver, ISO, and other styles
8

Sobol, Michael I. "Data Encryption." Information Systems Security 3, no. 3 (1994): 27–31. http://dx.doi.org/10.1080/10658989409342465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hackworth, R. "Data encryption." Computer Bulletin 37, no. 6 (1995): 12–13. http://dx.doi.org/10.1093/combul/37.6.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

DeHart, Ed. "Data encryption." XRDS: Crossroads, The ACM Magazine for Students 15, no. 1 (2008): 21–27. http://dx.doi.org/10.1145/1452012.1452017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Data encryption"

1

Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.

Full text
Abstract:
Die heutige Informationsgesellschaft hat die Formen des menschlichen Handelns in vielen Bereichen des taeglichen Lebens veraendert. Die Moeglichkeit, Informationen über das Internet auszutauschen, draengt konventionelle Kommunikationsformen immer mehr in den Hintergrund. Gerade in den Bereichen eBusiness und ePayment, welche aufgrund der zunehmenden Globalisierung unabdingbar sind, spielen dabei die Sicherheit und die Authentitaet der uebertragenen Daten eine wichtige Rolle. Meine Seminararbeit stellt den Data Encryption Standard (DES) in seiner Funktionsweise vor, diskutiert kritisch dessen S
APA, Harvard, Vancouver, ISO, and other styles
2

Fahmy, A. "Data encryption of communication data links." Thesis, University of Kent, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Topsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.

Full text
Abstract:
This thesis is about the theory behind and software development of TDE View. The application produces a graphical presentation containing graphical objects, such as charts and tables, which display real time data derived from online and currently available services in Swedbank. TDE View is a long term replacement of the previous solution, TDE System Monitor, the purpose of TDE View is to provide the ability to preview the aforementioned features online instead of local deployment. Moreover, the thesis will cover aspects regarding concepts and ideas in transferring data from different hosts in
APA, Harvard, Vancouver, ISO, and other styles
4

Luque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.

Full text
Abstract:
In this project you can find a study about different encryption algorithms, which are use to safeguard the information on messages over the network. We have developed a client-server application which will send information through the network which has to be secured. There are two kinds of encryption algorithms, the symmetric and the asymmetric key algorithms. Both were used to establish the communication, the asymmetric algorithm (RSA) is used to set up a symmetric key and then, all the communication process is done only with the symmetric algorithm (Blowfish).<br>En este proyecto encontraras
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Lingfeng. "Multidimensional data encryption with virtual optics /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?MECH%202003%20YU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.

Full text
Abstract:
La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la communication. La sécurité des données dans certaines applications comme le stockage sécurisé, l'authentification, la protection des droits d'auteurs, la communication militaire ou la visioconférence confidentielles, nécessitent de nouvelles stratégies en matière de transmission sécurisée. Deux techniques sont couramment utilisées pour la transmission sécurisée de données visuelles, à savoir : la cryptographie et la stégan
APA, Harvard, Vancouver, ISO, and other styles
7

Jones, John W. "Data encryption based on the logarithm problem." Thesis, University of Ottawa (Canada), 1986. http://hdl.handle.net/10393/4825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Clevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.

Full text
Abstract:
The RSA data encryption algorithm was developed by Ronald Rivest, Adi Shamir and Leonard Adelman in 1978 and is considered a de facto standard for public-key encryption. This computer science thesis demonstrates the author's ability to engineer a software system based on the RSA algorithm. This adaptation of the RSA encryption process was devised to be used on any type of data file, binary as well as text. In the process of developing this computer system, software tools were constructed that allow the exploration of the components of the RSA encryption algorithm. The RSA algorithm was further
APA, Harvard, Vancouver, ISO, and other styles
9

Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.

Full text
Abstract:
In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. However, manually encrypting and decrypting data along with the key management is a burden for the regular user of a database. The need for removing this burden gave birth to Transparent Data Encryption (TDE).   TDE technology is widely available nowadays and a number of vendors have developed their own solutions for prot
APA, Harvard, Vancouver, ISO, and other styles
10

Uehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Data encryption"

1

National Bureau of Standards. Data encryption standard. U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Held, Gilbert. Top secret data encryption techniques. Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. IBM, International Technical Support Organization, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

inc, International Resource Development, ed. Data, text & voice encryption worldwide markets. International Resource Development, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

inc, International Resource Development, ed. Data, fax & voice encryption equipment, worldwide. International Resource Development, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adir, Allon, Ehud Aharoni, Nir Drucker, Ronen Levy, Hayim Shaul, and Omri Soceanu. Homomorphic Encryption for Data Science (HE4DS). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65494-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Keshav, and Bishwajeet Kumar Pandey. Next Generation Mechanisms for Data Encryption. CRC Press, 2024. https://doi.org/10.1201/9781003508632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Data encryption"

1

Lenhard, Thomas H. "Encryption." In Data Security. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lafe, Olu. "Data Encryption." In Cellular Automata Transforms. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4365-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchanan, William J. "Data Encryption." In Advanced Data Communications and Networks. Springer US, 1997. http://dx.doi.org/10.1007/978-1-4419-8670-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_98-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Buchanan, Bill. "Data Encryption." In Handbook of Data Communications and Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-0905-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Buchanan, W. "Data Encryption." In Advanced Data Communications and Networks. CRC Press, 2023. http://dx.doi.org/10.1201/9781003420415-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "data encryption." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Ninghui. "Data Encryption." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Krähenbühl, Cyrill, and Adrian Perrig. "Searchable Symmetric Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_14.

Full text
Abstract:
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage. New schemes with more efficient search operations and reduced access and search pattern leakage that support novel settings, such as dynamic data sets and multiple users, have been proposed in the last few years. Especially with the emergence of cloud storage, encryptin
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data encryption"

1

Mageshwaran, M. K., and P. Sri Ramya. "Data Protection in the Era of Big Data Advanced Encryption Standard VS Data Encryption Standard." In 2024 Second International Conference Computational and Characterization Techniques in Engineering & Sciences (IC3TES). IEEE, 2024. https://doi.org/10.1109/ic3tes62412.2024.10877503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kulkarni, Milind, Pranav Doshi, Pavanraje Gaikwad, Nidhi Gandhi, Samika Gandhi, and Vaishnavi Dudhe. "PixelVault: Data Masking and Encryption." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaya, Muhammed Saadetdin, and Kenan İInce. "Using Quantum Resistant Variants of NIST IR 8454 Lightweight Encryption Algorithms in Image Encryption." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yan, Keyu. "Exploration and Discussion for Bitcoin Encryption Algorithms." In International Conference on Data Science and Engineering. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012819100004547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makasiranondh, Woratat, Supanit Angsirikul, and Anucha Aribarg. "A Data Spoofing Encryption Algorithm for Data Security and Data Privacy." In 2024 8th International Conference on Information Technology (InCIT). IEEE, 2024. https://doi.org/10.1109/incit63192.2024.10810622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ignacio-Cerrato, Sara, David Pacios, José Miguel Ezquerro Rodríguez, et al. "Ultracolor Multiplexing in QR Codes for Data Encryption and Transmission." In Frontiers in Optics. Optica Publishing Group, 2024. https://doi.org/10.1364/fio.2024.jd4a.3.

Full text
Abstract:
This paper introduces an innovative encryption method using ultracolor codification via the Prism Algorithm, which effectively encodes large data volumes into images with base64 encoding, demonstrating practical reliability and potential for secure data transmission.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.

Full text
Abstract:
Within the field of cybersecurity, protecting visual data poses significant difficulties because of its extensive use and vulnerability to unwanted access. This article introduces the Enhanced Lightweight Visual Cryptosystem (ELVC), which is intended to strengthen cybersecurity by efficiently encrypting visual data. Using the Blake2 hash algorithm and advanced encryption techniques, the ELVC encrypts AC and DC coefficients, which are critical components in visual data compression. The encryption algorithm improves data security by calculating entropy, histograms, and PSNR values. Rigorous NIST
APA, Harvard, Vancouver, ISO, and other styles
8

Shiraishi, Momoko. "Secure Cloud Data Encryption." In 2023 2nd Asia-Pacific Computer Technologies Conference (APCT). IEEE, 2023. http://dx.doi.org/10.1109/apct58752.2023.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Y. "A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm." In 5th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023). Institution of Engineering and Technology, 2023. http://dx.doi.org/10.1049/icp.2023.2981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Giblin, Chris, Sean Rooney, Pascal Vetsch, and Adrian Preston. "Securing Kafka with Encryption-at-Rest." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671388.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data encryption"

1

Ts'o, T. Telnet Data Encryption Option. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
3

Robertson, Perry J., Lyndon George Pierson, and Edward L. Witzke. Data encryption standard ASIC design and development report. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/918309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Appenzeller, G., L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Loftis, Charles, Tennyson Chen, and Jonathan Cirella. Attribute-level encryption of data in public android databases. RTI Press, 2013. http://dx.doi.org/10.3768/rtipress.2013.op.0016.1309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kelly, S. Security Implications of Using the Data Encryption Standard (DES). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bozhko, A., ed. Properties of Authenticated Encryption with Associated Data (AEAD) Algorithms. RFC Editor, 2025. https://doi.org/10.17487/rfc9771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barker, W. C., and E. B. Barker. Recommendation for the triple data encryption algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-67r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barker, Elaine, and Nicky Mouha. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-67r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barker, W. C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-67v1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!