Books on the topic 'Data Encryption Standard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Data Encryption Standard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.
Find full textComputer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textBiham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.
Full textBrute force: Cracking the data encryption standard. New York: Copernicus Books, 2005.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.
Find full textIntroduction to the analysis of the data encryption standard (DES). Laguna Hills, CA: Aegean Park Press, 1991.
Find full textSimovits, Mikael J. The DES, an extensive documentation and evaluation of the Data Encryption Standard. Laguna Hills, Calif: Aegean Park Press, 1995.
Find full textChris, Mitchell, ed. User's guide to cryptography and standards. Boston, Mass: Artech House, 2005.
Find full textLongley, Dennis. Data & computer security: Dictionary of standards, concepts, and terms. New York, N.Y: Stockton Press, 1987.
Find full textMichael, Shain, ed. Data & computer security: Dictionary of standards, concepts and terms. Basingstoke: Macmillan, 1987.
Find full textSteve, Lloyd, and Adams Carlisle 1961-, eds. Understanding PKI: Concepts, standards, and deployment considerations. 2nd ed. Boston: Addison-Wesley, 2003.
Find full textThe Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes: Hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, June 19, 1997. Washington: U.S. G.P.O., 1997.
Find full textGladychev, Pavel. The Development of an Extensible Architecture for a Secure Trusted Third Party Server. Dublin: University College Dublin, 1999.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Computer Security Enhancement Act of 1997: Report of the Committee on Commerce, Science, and Transportation on H.R. 1903. Washington: U.S. G.P.O., 1998.
Find full textPeikari, Cyrus. Maximum Wireless Security. Upper Saddle River: Pearson Education, 2005.
Find full textH, Gregory Peter, ed. CISSP for dummies. 2nd ed. Indianapolis, IN: Wiley Pub., 2007.
Find full textH, Gregory Peter, ed. CISSP for dummies. 4th ed. Hoboken, N.J: John Wiley & Sons, 2012.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.
Find full textBiham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2012.
Find full textCurtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer London, Limited, 2007.
Find full textCid, Carlos, Matthew Robshaw, and Sean Murphy. Algebraic Aspects of the Advanced Encryption Standard. Springer London, Limited, 2006.
Find full textCid, Carlos, Sean Murphy, and Matthew J. B. Robshaw. Algebraic Aspects of the Advanced Encryption Standard. Springer, 2010.
Find full textDaemen, Joan, and Vincent Rijmen. Design of Rijndael: The Advanced Encryption Standard. Springer Berlin / Heidelberg, 2021.
Find full textBlokdyk, Gerardus. Data Encryption Standard a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textDaemen, Joan, and Vincent Rijmen. Design of Rijndael: AES - the Advanced Encryption Standard. Springer London, Limited, 2013.
Find full textRandomness testing of the advanced encryption standard finalist candidates. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textDaemen, Joan, and Vincent Rijmen. The Design of Rijndael: The Advanced Encryption Standard. Springer, 2020.
Find full textAlgebraic Aspects of the Advanced Encryption Standard (Advances in Information Security). Springer, 2006.
Find full textJ, Pomper William, and United States. National Telecommunications and Information Administration., eds. Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.
Find full textLinking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.
Find full textJ, Pomper William, and United States. National Telecommunications and Information Administration, eds. Linking protection in federal standard 1045 HF radios using the data encryption standard. [Washington, D.C.?]: U.S. Dept. of Commerce, National Telecommunications and Information Administration, 1994.
Find full textNational Institute of Standards and Technology (U.S.), ed. Randomness testing of the advanced encryption standard candidate algorithms. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textThe Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography). Springer, 2002.
Find full textMartin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.
Full textNational Institute of Standards and Technology (U.S.), ed. Efficiency testing of ANSI C implementations of Round 1 candidate algorithms for the Advanced Encryption Standard. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textData compression in financial telecommunications: American national standard for financial services : ANSI X9.32-2006. Annapolis, Md: Accredited Standards Committee X9, Inc., Financial Industry Standards, 2006.
Find full textRijmen, Vincent, Hans Dobbertin, and Aleksandra Sowa. Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. Springer London, Limited, 2005.
Find full text(Editor), Hans Dobbertin, Vincent Rijmen (Editor), and Aleksandra Sowa (Editor), eds. Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers (Lecture Notes in Computer Science). Springer, 2005.
Find full textInstitute Of Electrical and Electronics Engineers. IEEE 802.1AECG-2017 IEEE Standard for Local and metropolitan area networks--Media Access Control Security - Amendment 3: Ethernet Data Encryption devices. IEEE, 2017.
Find full textDoraswamy, Naganand, and Dan Harkins. Ipsec: The New Security Standard for the Inter- net, Intranets, and Virtual Private Networks. Prentice Hall PTR, 1999.
Find full textIpsec: The New Security Standard for the Inter- net, Intranets, and Virtual Private Networks. Prentice Hall PTR, 1999.
Find full textDent, Alex W., and Chris J. Mitchell. User's Guide To Cryptography And Standards (Artech House Computer Security). Artech House Publishers, 2004.
Find full textAssociation, American Bar. Digital Signature Guidelines: Legal Infrastructure for Certification Authorities and Electronic Commerce. American Bar Association, 1996.
Find full text