List of telecommunications encryption terms

George W. Bush using a Motorola STU-III immediately after the September 11 attacks
KSD-64 "Crypto-ignition keys" on display at the National Cryptologic Museum in 2005

This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.

See also

References

  1. Owens, F. J. (1993). Signal Processing of Speech. Houndmills: MacMillan Press. ISBN 0-333-51922-1.
  2. Coppersmith, Don. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243–250.
  3. Schneier, Bruce (3 March 2006). "Caller ID Spoofing". schneier.com. Retrieved 16 January 2011.
  4. Zimmermann, Phil (2010-06-17). "Internet-Draft. ZRTP: Media Path Key Agreement for Unicast Secure RTP". Retrieved 2010-06-17.

Further reading

External links

This article is issued from Wikipedia - version of the Sunday, June 28, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.