This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Survey of Encryption Standards
November/December 1993 (vol. 13 no. 6)
pp. 74-81

The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption.

Citation:
Burt Kaliski, "A Survey of Encryption Standards," IEEE Micro, vol. 13, no. 6, pp. 74-81, Nov.-Dec. 1993, doi:10.1109/40.248057
Usage of this product signifies your acceptance of the Terms of Use.