A Comparison of the 3DES and AES Encryption Standards
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and network security , 1998 .
[2] Oleg Starostenko,et al. Novel Algorithms and Techniques in Telecommunications and Networking , 2010 .
[3] Richard Mollin. Codes: The Guide to Secrecy From Ancient to Modern Times , 2005 .
[4] Paul C. van Oorschot,et al. A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.
[5] Charles P. Pfleeger,et al. Security in computing , 1988 .
[6] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[7] Atul Kahate. Cryptography and Network Security , 2009 .
[8] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[9] Eric Maiwald,et al. Network Security: A Beginner's Guide , 2001 .
[10] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[11] Adam Bender,et al. Review of "Codes: The Guide to Secrecy from Ancient to Modern Times by Richard A. Mollin", Chapman & Hall/CRC, 2005 , 2006, SIGA.
[12] V K Pachghare. Cryptography and Information Security , 2015 .
[13] Martin E. Hellman,et al. On the security of multiple encryption , 1981, CACM.