References
For additional reading, check out the following books and articles:
- Pseudonymization, Anonymization and the GDPRÂ (https://www.termsfeed.com/blog/gdpr-pseudonymization-anonymization/)
- Symmetric and Asymmetric Encryption (https://medium.com/hackernoon/symmetric-and-asymmetric-encryption-5122f9ec65b1)
- Cryptography with Python Tutorial (https://www.tutorialspoint.com/cryptography_with_python/)
- Encryption in R with cyphr (https://docs.ropensci.org/cyphr/articles/cyphr.html)