Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Material type:
- text
- unmediated
- volume
- 0471128457
- 9780471117094
- 005.82 SC.A 1996 G.C 23
- QA76.9.A25 S35 1996
Item type | Current library | Collection | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
The Knowledge Hub Library | Gift collections | 005.82 SC.A 1996 G.C (Browse shelf(Opens below)) | Available | 191601 |
Browsing The Knowledge Hub Library shelves, Collection: Gift collections Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 ST.C 2009 G.C CompTIA security+ : review guide / | 005.8 ST.C 2009 G.C CompTIA security+ : review guide / | 005.8 WH.C 2009 G.C Chained exploits : advanced hacking attacks from start to finish / | 005.82 SC.A 1996 G.C Applied cryptography : protocols, algorithms, and source code in C / | 005.82 WO.C 2007 G.C Cryptology unlocked / | 005.88 GR.C 2004 G.C Computer viruses for dummies / | 006.7 BE.D 2005 G.C Design fundamentals for new media / |
Includes bibliographical references (pages 675-741) and index.
Foreword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze.
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
There are no comments on this title.