To see the other types of publications on this topic, follow the link: Data Encryption Standard (DES).

Books on the topic 'Data Encryption Standard (DES)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data Encryption Standard (DES).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Biham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Introduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Data breach and encryption handbook. Chicago: American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Simovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Longley, Dennis. Data & computer security: Dictionary of standards, concepts, and terms. New York, N.Y: Stockton Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Michael, Shain, ed. Data & computer security: Dictionary of standards, concepts and terms. Basingstoke: Macmillan, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Chris, Mitchell, ed. User's guide to cryptography and standards. Boston, Mass: Artech House, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dobbertin, Hans, Vincent Rijmen, and Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes: Hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, June 19, 1997. Washington: U.S. G.P.O., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

International Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. Poughkeepsie, NY: IBM, International Technical Support Organization, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Blinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gladychev, Pavel. The Development of an Extensible Architecture for a Secure Trusted Third Party Server. Dublin: University College Dublin, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Vasu, E. Critical evalutiona of advanced encryption standard: Rijndael. London: University of East London, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Serdar, Pehlivanoglu, and SpringerLink (Online service), eds. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Smith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Tan, Woei-Wen. Hardware/software codesign of data encryption algorithms. Manchester: UMIST, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

H, Gregory Peter, ed. CISSP for dummies. New York, NY: Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Miller, Lawrence. CISSP for dummies. 2nd ed. Indianapolis, IN: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

H, Gregory Peter, ed. CISSP for dummies. 2nd ed. Indianapolis, IN: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

H, Gregory Peter, ed. CISSP for dummies. 4th ed. Hoboken, N.J: John Wiley & Sons, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Personal encryption clearly explained. San Diego: AP Professional, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Xu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

International Business Machines Corporation. International Technical Support Organization, ed. IBM system storage tape encryption solutions. 3rd ed. [Pougkeepsie, NY]: International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Seth, Fogie, ed. Maximum wireless security. Indianapolis, Ind: Sams, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Peikari, Cyrus. Maximum Wireless Security. Upper Saddle River: Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Rodney, Landrum, ed. Expert SQL server 2008 encryption. New York, NY: Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Xu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Steve, Lloyd, and Adams Carlisle 1961-, eds. Understanding PKI: Concepts, standards, and deployment considerations. 2nd ed. Boston: Addison-Wesley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Blokdyk, Gerardus. Data Encryption Standard a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Randomness testing of the advanced encryption standard finalist candidates. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Daemen, Joan, and Vincent Rijmen. The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

J, Pomper William, and United States. National Telecommunications and Information Administration., eds. Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

J, Pomper William, and United States. National Telecommunications and Information Administration, eds. Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

National Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Martin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.

Full text
Abstract:
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different modes have been proposed. We examine in detail four of the most well-established modes of operation and their core properties, as well as classifying other modes of operation.
APA, Harvard, Vancouver, ISO, and other styles
48

The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

National Institute of Standards and Technology (U.S.), ed. Efficiency testing of ANSI C implementations of Round 1 candidate algorithms for the Advanced Encryption Standard. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Data compression in financial telecommunications: American national standard for financial services : ANSI X9.32-2006. Annapolis, Md: Accredited Standards Committee X9, Inc., Financial Industry Standards, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography