You are on page 1of 1

http://www.inquiriesjournal.

com/articles/1698/a-brief-history-of-cryptography
http://www.icits2015.net/ancient-cryptography-history/
https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-
differences
http://bedford-computing.co.uk/learning/wp-content/uploads/2016/08/Principles-of-
Information-Security-4th-ed.-Michael-E.-Whitman.pdf
file:///C:/Users/Rezen/Downloads/cryptography/IntroToCryptography.pdf
file:///C:/Users/Rezen/Desktop/EncryptionResearchReview.pdf
file:///C:/Users/Rezen/Downloads/Cooper%20J.A.,%20Goldreich%20O.%20-%20Computer
%20Security%20&%20Cryptography%20(2000).pdf
https://www.researchgate.net/publication/289124401_Brief_History_of_Encryption
file:///C:/Users/Rezen/Downloads/The-Basics-of-Information-Security-Understanding-
the-Fundamentals-of-Infosec-in-Theory-and-Practice.pdf
file:///C:/Users/Rezen/Downloads/Information-Security-The-Complete-Reference-
Second-Edition.pdf
https://bus206.pressbooks.com/chapter/chapter-6-information-systems-security/

You might also like