Jump to content

List of telecommunications encryption terms

From Wikipedia, the free encyclopedia

George W. Bush using a Motorola STU-III immediately after the September 11 attacks
KSD-64 "Crypto-ignition keys" on display at the National Cryptologic Museum in 2005


This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.

See also

[edit]

References

[edit]
  1. ^ Owens, F. J. (1993). Signal Processing of Speech. Houndmills: MacMillan Press. ISBN 0-333-51922-1.
  2. ^ Coppersmith, Don. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243–250.
  3. ^ Schneier, Bruce (3 March 2006). "Caller ID Spoofing". schneier.com. Retrieved 16 January 2011.
  4. ^ Zimmermann, Phil (2010-06-17). "Internet-Draft. ZRTP: Media Path Key Agreement for Unicast Secure RTP". Retrieved 2010-06-17.

Further reading

[edit]
[edit]