Encryption
Bibliography
Bibliography
https://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/
Double Encryptionhttps://www.ipswitch.com/blog/double-encryption-is-it-more-secure-or-dangeroushttps://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption
Encryption at Resthttps://scottarc.blog/2024/06/02/encryption-at-rest-whose-threat-model-is-it-anyway/https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest
Virtual Machione Encryptionhttps://www.vmware.com/docs/vm-encryption-vsphere65-perf
Double Encryptionhttps://www.ipswitch.com/blog/double-encryption-is-it-more-secure-or-dangeroushttps://learn.microsoft.com/en-us/azure/security/fundamentals/double-encryption
Encryption at Resthttps://scottarc.blog/2024/06/02/encryption-at-rest-whose-threat-model-is-it-anyway/https://learn.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest
Virtual Machione Encryptionhttps://www.vmware.com/docs/vm-encryption-vsphere65-perf
TODO
FIPS140-2 (Level 2, Level 3 etc)
PCI HSM
e-Tokens
smartcards