Schneier, Bruce, 1963-
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. - 2nd ed. - New York : Wiley, c1996. - xxiii, 758 p. : ill. ; 24 cm.
Includes bibliographical references (p. 675-741) and index.
Contents in Brief : PART 1 CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols.- PART 11 CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. - PART 111 CRYPTOGRAPHIC ALGORITHMS. Mathematical background. Data Encryption Standard (DES). Other Block Ciphers. Still other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols.- PART 1V THE REAL WORLD. Example Implementations. Politics. Afterword by Matt Blaze .- PART V SOURCE CODE. References.
0471117099
Computer security.
Cryptography.
Telecommunication--Security measures.
005.82 / SCH
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. - 2nd ed. - New York : Wiley, c1996. - xxiii, 758 p. : ill. ; 24 cm.
Includes bibliographical references (p. 675-741) and index.
Contents in Brief : PART 1 CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols.- PART 11 CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. - PART 111 CRYPTOGRAPHIC ALGORITHMS. Mathematical background. Data Encryption Standard (DES). Other Block Ciphers. Still other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols.- PART 1V THE REAL WORLD. Example Implementations. Politics. Afterword by Matt Blaze .- PART V SOURCE CODE. References.
0471117099
Computer security.
Cryptography.
Telecommunication--Security measures.
005.82 / SCH