The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (1993 vol.13)
pp: 74-81
<p>The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption.</p>
Burt Kaliski, "A Survey of Encryption Standards", IEEE Micro, vol.13, no. 6, pp. 74-81, November/December 1993, doi:10.1109/40.248057
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool