These are the sources and citations used to research Adv Software Crypto. This bibliography was generated on Cite This For Me on

  • Journal

    Coppersmith, D.

    The Data Encryption Standard (DES) and its strength against attacks

    1994 - IBM Journal of Research and Development

    In-text: (Coppersmith 243-250)

    Your Bibliography: Coppersmith, D. "The Data Encryption Standard (DES) And Its Strength Against Attacks." IBM Journal of Research and Development 38.3 (1994): 243-250. Web. 20 Nov. 2019.

  • Book

    Elbirt, A. J.

    Understanding and applying cryptography and data security

    2009 - CRC Press

    In-text: (Elbirt)

    Your Bibliography: Elbirt, Adam J. Understanding And Applying Cryptography And Data Security. 1st ed. CRC Press, 2009. Print.

  • Book

    Forouzan, B. A.

    Cryptography and Network Security

    2008 - McGraw Hill - Boston

    In-text: (Forouzan)

    Your Bibliography: Forouzan, Behrouz A. Cryptography And Network Security. Boston: McGraw Hill, 2008. Print.

  • Book

    Kohno, T., Ferguson, N. and Schneier, B.

    Cryptography engineering: Design Principles and Practical Applications

    2010 - Wiley Pub., Inc. - Indianapolis, IN

    In-text: (Kohno, Ferguson and Schneier)

    Your Bibliography: Kohno, Tadayoshi, Niels Ferguson, and Bruce Schneier. Cryptography Engineering: Design Principles And Practical Applications. Indianapolis, IN: Wiley Pub., Inc., 2010. Print.

  • Book

    Konheim, A. G.

    Computer security and cryptography

    2007 - Wiley-Interscience - Hoboken, N.J.

    In-text: (Konheim)

    Your Bibliography: Konheim, Alan G. Computer Security And Cryptography. 1st ed. Hoboken, N.J.: Wiley-Interscience, 2007. Print.

  • Book

    Konheim, A. G.

    Computer security and cryptography

    2007 - Wiley-Interscience - Hoboken, N.J

    In-text: (Konheim)

    Your Bibliography: Konheim, Alan G. Computer Security And Cryptography. 1st ed. Hoboken, N.J: Wiley-Interscience, 2007. Print.

  • Book

    McAndrew, A.

    Introduction to cryptography with open-source software

    2011 - CRC Press

    In-text: (McAndrew)

    Your Bibliography: McAndrew, Alasdair. Introduction To Cryptography With Open-Source Software. 1st ed. CRC Press, 2011. Print.

  • Book

    Menezes, A. J., Vanstone, S. A. and Van Oorschot, P. C.

    Handbook of applied cryptography

    1996 - CRC Press - Boca Ratón

    In-text: (Menezes, Vanstone and Van Oorschot)

    Your Bibliography: Menezes, Alfred J, Scott A Vanstone, and Paul C Van Oorschot. Handbook Of Applied Cryptography. 1st ed. Boca Ratón: CRC Press, 1996. Print.

  • Book

    Paar, C. and Pelzl, J.

    Understanding cryptography

    2011 - Springer - Berlin

    In-text: (Paar and Pelzl)

    Your Bibliography: Paar, Christof, and Jan Pelzl. Understanding Cryptography. Berlin: Springer, 2011. Print.

  • Book

    Piper, F. and Murphy, S.


    2002 - Oxford University Press - New York

    In-text: (Piper and Murphy)

    Your Bibliography: Piper, Fred, and Sean Murphy. Cryptography. New York: Oxford University Press, 2002. Print.

  • Report

    RSA Laboratories

    Stream Ciphers

    1995 - RSA Laboratories - Redwood City, CA

    In-text: (RSA Laboratories 2-3)

    Your Bibliography: RSA Laboratories. Stream Ciphers. Redwood City, CA: RSA Laboratories, 1995. Web. 6 Dec. 2019. RSA Laboratories Technical Report TR-701.

  • Book

    Schneier, B.

    Applied cryptography

    1996 - Wiley - New York

    In-text: (Schneier)

    Your Bibliography: Schneier, Bruce. Applied Cryptography. 2nd ed. New York: Wiley, 1996. Print.

  • Journal

    Shannon, C. E.

    Communication Theory of Secrecy Systems*

    1949 - Bell System Technical Journal

    In-text: (Shannon 656-715)

    Your Bibliography: Shannon, C. E. "Communication Theory Of Secrecy Systems*." Bell System Technical Journal 28.4 (1949): 656-715. Web. 15 Dec. 2019.

  • Book

    Smart, N. P.

    Cryptography: An Introduction

    2003 - McGraw-Hill - New York, NY

    In-text: (Smart)

    Your Bibliography: Smart, Nigel P. Cryptography: An Introduction. 3rd ed. New York, NY: McGraw-Hill, 2003. Print.

  • Book

    Swenson, C.

    Modern cryptanalysis

    2008 - Wiley Pub. - Indianapolis, Ind.

    In-text: (Swenson)

    Your Bibliography: Swenson, Christopher. Modern Cryptanalysis. 1st ed. Indianapolis, Ind.: Wiley Pub., 2008. Print.

  • Book

    Vacca, J. R.

    Cyber security and IT infrastructure protection

    2014 - Syngress - Waltham, MA

    In-text: (Vacca)

    Your Bibliography: Vacca, John R. Cyber Security And IT Infrastructure Protection. 1st ed. Waltham, MA: Syngress, 2014. Print.

  • Book

    Wobst, R. and Shafir, A.

    Cryptology unlocked

    2007 - John Wiley & Sons - Chichester

    In-text: (Wobst and Shafir)

    Your Bibliography: Wobst, Reinhard, and Angelika Shafir. Cryptology Unlocked. 1st ed. Chichester: John Wiley & Sons, 2007. Print.

  • Journal

    Zanin, M. and Pisarchik, A. N.

    Gray code permutation algorithm for high-dimensional data encryption

    2014 - Information Sciences

    In-text: (Zanin and Pisarchik 288-297)

    Your Bibliography: Zanin, Massimiliano, and Alexander N. Pisarchik. "Gray Code Permutation Algorithm For High-Dimensional Data Encryption." Information Sciences 270 (2014): 288-297. Web. 18 Nov. 2019.

  • Journal

    Zhang, R. and Chen, L.

    A block cipher using key-dependent S-box and P-boxes

    2008 - 2008 IEEE International Symposium on Industrial Electronics

    In-text: (Zhang and Chen)

    Your Bibliography: Zhang, Runtong, and Like Chen. "A Block Cipher Using Key-Dependent S-Box And P-Boxes." 2008 IEEE International Symposium on Industrial Electronics (2008): n. pag. Web. 11 Dec. 2019.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies