To see the other types of publications on this topic, follow the link: Data Encryption Standard.

Books on the topic 'Data Encryption Standard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data Encryption Standard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Computer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Introduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Data breach and encryption handbook. Chicago: American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chris, Mitchell, ed. User's guide to cryptography and standards. Boston, Mass: Artech House, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Longley, Dennis. Data & computer security: Dictionary of standards, concepts, and terms. New York, N.Y: Stockton Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Michael, Shain, ed. Data & computer security: Dictionary of standards, concepts and terms. Basingstoke: Macmillan, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Steve, Lloyd, and Adams Carlisle 1961-, eds. Understanding PKI: Concepts, standards, and deployment considerations. 2nd ed. Boston: Addison-Wesley, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes: Hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, June 19, 1997. Washington: U.S. G.P.O., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gladychev, Pavel. The Development of an Extensible Architecture for a Secure Trusted Third Party Server. Dublin: University College Dublin, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Computer Security Enhancement Act of 1997: Report of the Committee on Commerce, Science, and Transportation on H.R. 1903. Washington: U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Peikari, Cyrus. Maximum Wireless Security. Upper Saddle River: Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Seth, Fogie, ed. Maximum wireless security. Indianapolis, Ind: Sams, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Miller, Lawrence. CISSP for dummies. 2nd ed. Indianapolis, IN: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

H, Gregory Peter, ed. CISSP for dummies. New York, NY: Wiley Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

H, Gregory Peter, ed. CISSP for dummies. 2nd ed. Indianapolis, IN: Wiley Pub., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

H, Gregory Peter, ed. CISSP for dummies. 4th ed. Hoboken, N.J: John Wiley & Sons, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Curtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Curtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Cid, Carlos, Matthew Robshaw, and Sean Murphy. Algebraic Aspects of the Advanced Encryption Standard. Springer London, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cid, Carlos, Sean Murphy, and Matthew J. B. Robshaw. Algebraic Aspects of the Advanced Encryption Standard. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Daemen, Joan, and Vincent Rijmen. Design of Rijndael: The Advanced Encryption Standard. Springer Berlin / Heidelberg, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Blokdyk, Gerardus. Data Encryption Standard a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Daemen, Joan, and Vincent Rijmen. Design of Rijndael: AES - the Advanced Encryption Standard. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Randomness testing of the advanced encryption standard finalist candidates. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Daemen, Joan, and Vincent Rijmen. The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security). Springer, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

J, Pomper William, and United States. National Telecommunications and Information Administration., eds. Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

J, Pomper William, and United States. National Telecommunications and Information Administration, eds. Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

National Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Martin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.

Full text
Abstract:
In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different modes have been proposed. We examine in detail four of the most well-established modes of operation and their core properties, as well as classifying other modes of operation.
APA, Harvard, Vancouver, ISO, and other styles
42

National Institute of Standards and Technology (U.S.), ed. Efficiency testing of ANSI C implementations of Round 1 candidate algorithms for the Advanced Encryption Standard. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Data compression in financial telecommunications: American national standard for financial services : ANSI X9.32-2006. Annapolis, Md: Accredited Standards Committee X9, Inc., Financial Industry Standards, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rijmen, Vincent, Hans Dobbertin, and Aleksandra Sowa. Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. Springer London, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

(Editor), Hans Dobbertin, Vincent Rijmen (Editor), and Aleksandra Sowa (Editor), eds. Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers (Lecture Notes in Computer Science). Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Institute Of Electrical and Electronics Engineers. IEEE 802.1AECG-2017 IEEE Standard for Local and metropolitan area networks--Media Access Control Security - Amendment 3: Ethernet Data Encryption devices. IEEE, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Doraswamy, Naganand, and Dan Harkins. Ipsec: The New Security Standard for the Inter- net, Intranets, and Virtual Private Networks. Prentice Hall PTR, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ipsec: The New Security Standard for the Inter- net, Intranets, and Virtual Private Networks. Prentice Hall PTR, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dent, Alex W., and Chris J. Mitchell. User's Guide To Cryptography And Standards (Artech House Computer Security). Artech House Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Association, American Bar. Digital Signature Guidelines: Legal Infrastructure for Certification Authorities and Electronic Commerce. American Bar Association, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography