Issue No. 06 - November/December (1993 vol. 13)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/40.248057
<p>The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption.</p>
B. Kaliski, "A Survey of Encryption Standards," in IEEE Micro, vol. 13, no. , pp. 74-81, 1993.