Key (cryptography) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Key (cryptography)" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
652nd place
515th place
11th place
8th place
355th place
454th place
222nd place
297th place
8,991st place
6,535th place
332nd place
246th place
6,539th place
5,237th place
low place
low place
415th place
327th place
1st place
1st place
low place
8,773rd place
low place
low place

cloudflare.com

cornell.edu

cs.cornell.edu

differencebetween.net

doi.org

  • Piper, Fred (2002), "Cryptography", Encyclopedia of Software Engineering, American Cancer Society, doi:10.1002/0471028959.sof070, ISBN 978-0-471-02895-6, retrieved 2021-04-09
  • Chandra, S.; Paira, S.; Alam, S. S.; Sanyal, G. (2014). "A comparative survey of Symmetric and Asymmetric Key Cryptography". 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE). pp. 83–93. doi:10.1109/ICECCE.2014.7086640. ISBN 978-1-4799-5748-4. S2CID 377667.
  • Kumar, M. G. V.; Ragupathy, U. S. (March 2016). "A Survey on current key issues and status in cryptography". 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). pp. 205–210. doi:10.1109/WiSPNET.2016.7566121. ISBN 978-1-4673-9338-6. S2CID 14794991.
  • Mrdovic, S.; Perunicic, B. (September 2008). "Kerckhoffs' principle for intrusion detection". Networks 2008 - the 13th International Telecommunications Network Strategy and Planning Symposium. Vol. Supplement. pp. 1–8. doi:10.1109/NETWKS.2008.6231360. ISBN 978-963-8111-68-5.
  • Turan, M. S.; Barker, E. B.; Burr, W. E.; Chen, L. (2010). Recommendation for password-based key derivation (PDF) (Report). doi:10.6028/NIST.SP.800-132. S2CID 56801929.
  • Yassein, M. B.; Aljawarneh, S.; Qawasmeh, E.; Mardini, W.; Khamayseh, Y. (2017). "Comprehensive study of symmetric key and asymmetric key encryption algorithms". 2017 International Conference on Engineering and Technology (ICET). pp. 1–7. doi:10.1109/ICEngTechnol.2017.8308215. ISBN 978-1-5386-1949-0. S2CID 3781693.

ieee.org

ieeexplore.ieee.org

mit.edu

news.mit.edu

nist.gov

nvlpubs.nist.gov

semanticscholar.org

api.semanticscholar.org

sophos.com

nakedsecurity.sophos.com

techopedia.com

ulusofona.pt

netlab.ulusofona.pt

web.archive.org

wiley.com

onlinelibrary.wiley.com

  • Piper, Fred (2002), "Cryptography", Encyclopedia of Software Engineering, American Cancer Society, doi:10.1002/0471028959.sof070, ISBN 978-0-471-02895-6, retrieved 2021-04-09