These are the sources and citations used to research The Role of the Cryptographic Algorithm. This bibliography was generated on Cite This For Me on
In-text: (Barker, 2022)
Your Bibliography: Barker, E., 2022. Recommendation for Key Management. [online] nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf. Available at: <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf> [Accessed 13 January 2022].
In-text: (kauffman, 2013)
Your Bibliography: kauffman, L., 2013. About Secure Password Hashing. [Blog] IT SECURITY COMMUNITY BLOG, Available at: <http://security.blogoverflow.com/2013/09/about-secure-password-hashing/> [Accessed 16 January 2022].
In-text: (Rountree, 2011)
Your Bibliography: Rountree, D., 2011. Hashing Algorithm. [online] sciencedirect.com/topics/computer-science/hashing-algorithm. Available at: <https://www.sciencedirect.com/topics/computer-science/hashing-algorithm> [Accessed 16 January 2022].
In-text: (Spies, 2017)
Your Bibliography: Spies, T., 2017. Cryptographic Algorithm. [online] Computer and Information Security Handbook (Third Edition). Available at: <https://www.sciencedirect.com/topics/computer-science/cryptographic-algorithm> [Accessed 13 January 2022].
In-text: (Turner, 2019)
Your Bibliography: Turner, D., 2019. Summary of cryptographic algorithms - according to NIST. [online] Cryptomathic.com. Available at: <https://www.cryptomathic.com/news-events/blog/summary-of-cryptographic-algorithms-according-to-nist> [Accessed 13 January 2022].
10,587 students joined last month!