These are the sources and citations used to research Cryptography. This bibliography was generated on Cite This For Me on
In-text: (Arora, 2012)
Your Bibliography: Arora, M., 2012. How secure is AES against brute force attacks?. EE TIMES, [online] Available at: <http://www.eetimes.com/document.asp?doc_id=1279619> [Accessed 25 February 2015].
In-text: (J. Simmons, 2015)
Your Bibliography: J. Simmons, G., 2015. cryptology. [online] Encyclopedia Britannica. Available at: <http://www.britannica.com/EBchecked/topic/145058/cryptology/25636/Types-of-cryptanalysis> [Accessed 22 February 2015].
In-text: (Lander, n.d.)
Your Bibliography: Lander, S., n.d. Advantages & Disadvantages of Symmetric Key Encryption. [online] Science - Opposing Views. Available at: <http://science.opposingviews.com/advantages-disadvantages-symmetric-key-encryption-2609.html> [Accessed 25 February 2015].
In-text: (Learn Cryptography — Cryptanalysis, 2015)
Your Bibliography: Learncryptography. 2015. Learn Cryptography — Cryptanalysis. [online] Available at: <http://learncryptography.com/category/cryptanalysis/> [Accessed 25 February 2015].
In-text: (Description of Symmetric and Asymmetric Encryption, 2007)
Your Bibliography: Microsoft Support. 2007. Description of Symmetric and Asymmetric Encryption. [online] Available at: <http://support.microsoft.com/kb/246071> [Accessed 25 February 2015].
In-text: (Ulanoff, 2014)
Your Bibliography: Ulanoff, L., 2014. China Has the Fastest Super Computer in the World -- Again. [online] Mashable. Available at: <http://mashable.com/2014/06/23/china-fastest-supercomputer/> [Accessed 25 February 2015].
10,587 students joined last month!