The Data Encryption Standard (DES) and its strength against attacks
IBM Journal of Research and Development
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Privacy on the line: the politics of wiretapping and encryption
Privacy on the line: the politics of wiretapping and encryption
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A simple encryption strategy based on addition
Journal of Computing Sciences in Colleges
Hi-index | 48.22 |