Public-key cryptography (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Public-key cryptography" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
1st place
1st place
5th place
5th place
4th place
4th place
3,153rd place
2,332nd place
102nd place
76th place
low place
low place
low place
low place
6th place
6th place
207th place
136th place
415th place
327th place
6,184th place
4,465th place
214th place
176th place
234th place
397th place
18th place
17th place
3rd place
3rd place
low place
8,415th place
1,933rd place
1,342nd place
low place
low place
5,990th place
3,752nd place
5,032nd place
3,357th place
222nd place
297th place
low place
low place
69th place
59th place
513th place
537th place
low place
low place
188th place
118th place
786th place
558th place
179th place
183rd place
low place
low place
low place
low place

archive.org (Global: 6th place; English: 6th place)

arxiv.org (Global: 69th place; English: 59th place)

  • Bjorgvinsdottir, Hanna; Bentley, Phil (24 June 2021). "Warp2: A Method of Email and Messaging with Encrypted Addressing and Headers". arXiv:1411.6409 [cs.CR].

books.google.com (Global: 3rd place; English: 3rd place)

crypto-textbook.com (Global: low place; English: low place)

cryptocellar.org (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

freehaven.net (Global: low place; English: low place)

greatfire.org (Global: low place; English: low place)

en.greatfire.org

handle.net (Global: 102nd place; English: 76th place)

hdl.handle.net

harvard.edu (Global: 18th place; English: 17th place)

ui.adsabs.harvard.edu

iacr.org (Global: 5,032nd place; English: 3,357th place)

eprint.iacr.org

ietf.org (Global: 214th place; English: 176th place)

datatracker.ietf.org

  • R. Shirey (August 2007). Internet Security Glossary, Version 2. Network Working Group. doi:10.17487/RFC4949. RFC 4949. Informational.

ionos.com (Global: low place; English: low place)

mit.edu (Global: 415th place; English: 327th place)

dspace.mit.edu

people.csail.mit.edu

msri.org (Global: low place; English: low place)

nature.com (Global: 234th place; English: 397th place)

newindianexpress.com (Global: 188th place; English: 118th place)

nih.gov (Global: 4th place; English: 4th place)

pubmed.ncbi.nlm.nih.gov

ncbi.nlm.nih.gov

psu.edu (Global: 207th place; English: 136th place)

citeseerx.ist.psu.edu

rfc-editor.org (Global: 6,184th place; English: 4,465th place)

  • R. Shirey (August 2007). Internet Security Glossary, Version 2. Network Working Group. doi:10.17487/RFC4949. RFC 4949. Informational.

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

stanford.edu (Global: 179th place; English: 183rd place)

ee.stanford.edu

ucsd.edu (Global: 1,933rd place; English: 1,342nd place)

cseweb.ucsd.edu

upguard.com (Global: low place; English: low place)

usenix.org (Global: 5,990th place; English: 3,752nd place)

  • Davis, Don (2001). "Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML". Proceedings of the 2001 USENIX Annual Technical Conference. USENIX. pp. 65–78. Why is naïve Sign & Encrypt insecure? Most simply, S&E is vulnerable to "surreptitious forwarding:" Alice signs & encrypts for Bob's eyes, but Bob re-encrypts Alice's signed message for Charlie to see. In the end, Charlie believes Alice wrote to him directly, and can't detect Bob's subterfuge.

uwaterloo.ca (Global: 3,153rd place; English: 2,332nd place)

cacr.uwaterloo.ca

web.archive.org (Global: 1st place; English: 1st place)

wiley.com (Global: 222nd place; English: 297th place)

ietresearch.onlinelibrary.wiley.com

wolfram.com (Global: 513th place; English: 537th place)

mathworld.wolfram.com

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

yp.to (Global: low place; English: 8,415th place)

cr.yp.to

zdnet.com (Global: 786th place; English: 558th place)