Key size (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Key size" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
355th place
454th place
2nd place
2nd place
7,043rd place
4,687th place
low place
low place
low place
low place
1,317th place
873rd place
388th place
265th place
32nd place
21st place
3,722nd place
2,509th place
low place
low place
low place
low place
4,789th place
3,253rd place
11th place
8th place
4,903rd place
3,679th place
low place
low place
580th place
462nd place
6th place
6th place
14th place
14th place
1,038th place
668th place

archive.org (Global: 6th place; English: 6th place)

ia801409.us.archive.org

archive.today (Global: 14th place; English: 14th place)

arstechnica.com (Global: 388th place; English: 265th place)

berkeley.edu (Global: 580th place; English: 462nd place)

cs.berkeley.edu

cato.org (Global: 4,789th place; English: 3,253rd place)

object.cato.org

certicom.com (Global: low place; English: low place)

defense.gov (Global: 1,038th place; English: 668th place)

media.defense.gov

doi.org (Global: 2nd place; English: 2nd place)

eetimes.com (Global: 3,722nd place; English: 2,509th place)

emc.com (Global: low place; English: low place)

fortify.net (Global: low place; English: low place)

ghostarchive.org (Global: 32nd place; English: 21st place)

  • Adrian, David; Bhargavan, Karthikeyan; Durumeric, Zakir; Gaudry, Pierrick; Green, Matthew; Halderman, J. Alex; Heninger, Nadia; Springall, Drew; Thomé, Emmanuel; Valenta, Luke; VanderSloot, Benjamin; Wustrow, Eric; Zanella-Béguelin, Santiago; Zimmermann, Paul (October 2015). Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (PDF). 22nd ACM Conference on Computer and Communications Security (CCS '15). Denver, CO. Archived (PDF) from the original on 2022-10-10.

inria.fr (Global: 4,903rd place; English: 3,679th place)

lists.gforge.inria.fr

nist.gov (Global: 355th place; English: 454th place)

nvlpubs.nist.gov

  • Barker, Elaine; Roginsky, Allen (March 2019). "Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, NIST SP-800-131A Rev 2" (PDF). Nvlpubs.nist.gov. Retrieved 2023-02-11.
  • Barker, Elaine; Barker, William; Burr, William; Polk, William; Smid, Miles (2005-08-01). "Recommendation for Key Management – Part 1: General" (PDF). NIST Special Publication. National Institute of Standards and Technology. Table 4, p. 66. doi:10.6028/NIST.SP.800-57p1. Archived (PDF) from the original on 2016-12-13. Retrieved 2019-01-08.
  • Barker, Elaine; Dang, Quynh (2015-01-22). "Recommendation for Key Management; Part 3: Application-Specific Key Management Guidance" (PDF). NIST Special Publication. National Institute of Standards and Technology: 12. doi:10.6028/NIST.SP.800-57pt3r1. Archived (PDF) from the original on 2015-02-26. Retrieved 2017-11-24.
  • Barker, Elaine (May 2020). "Recommendation for Key Management: Part 1 – General" (PDF). NIST Special Publication. National Institute of Standards and Technology: 53. doi:10.6028/NIST.SP.800-57pt1r5. S2CID 243189598. Archived (PDF) from the original on 2020-05-09.

nsa.gov (Global: 7,043rd place; English: 4,687th place)

nsa.gov

apps.nsa.gov

pcworld.com (Global: 1,317th place; English: 873rd place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

toad.com (Global: low place; English: low place)

weakdh.org (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)