Data Encryption Using Square Grid Transposition With Cryptography DSA Technique
暂无分享,去创建一个
[1] Jaime Muñoz Masqué,et al. Técnicas criptográficas de protección de datos , 2004 .
[2] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[3] Alaa H. Alhamami,et al. Attack and construction of simulator for some cipher systems using neuro-Identifier , 2010, Int. Arab J. Inf. Technol..
[4] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] Edward F. Schaefer. A Simplified Data Encryption Standard Algorithm , 1996, Cryptologia.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Johannes A. Buchmann,et al. Introduction to Cryptography , 2001 .
[12] William Stallings,et al. Cryptography and network security , 1998 .
[13] Edward Roback,et al. SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .
[14] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .