Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Diffie W, Hellman ME. New directions in cryptography. IEEE Trans InformTheory. 1976;22(6):644–54.
Federal information processing standards publication 46–3: data encryption standard (DES), 1999.
Federal information processing standards publication 197: advanced encryption standard, Nov 2001.
Kahn D. The codebreakers: the comprehensive history of secret communication from ancient times to the internet. 1996.
Menezes AJ, Oorschot PCV, Vanstone SA. Handbook of applied cryptography. West Palm Beach: CRC; 1997. (Revised reprint with updates).
Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–6.
Singh S. The code book: the science of secrecy from ancient Egypt to quantum cryptography. Garden City: Anchor; 2000.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Li, N. (2018). Data Encryption. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_98
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_98
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering