The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (1993 vol. 13)
ISSN: 0272-1732
pp: 74-81
<p>The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption.</p>
Burt Kaliski, "A Survey of Encryption Standards", IEEE Micro, vol. 13, no. , pp. 74-81, November/December 1993, doi:10.1109/40.248057
80 ms
(Ver 3.3 (11022016))