Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
By: Schneier, Bruce.
Publisher: New York : Wiley, c1996Edition: 2nd ed.Description: xxiii, 758 p. : ill. ; 24 cm.ISBN: 0471117099.Subject(s): Computer security | Cryptography | Telecommunication -- Security measuresDDC classification: 005.82Item type | Current location | Shelf location | Call number | Copy number | Status | Notes | Date due | Barcode | Remark |
---|---|---|---|---|---|---|---|---|---|
Main Collection | Taylor's Library-TU |
Floor 3, Shelf 2 , Side 1, TierNo 2, BayNo 1 |
005.82 SCH (Browse shelf) | 1 | Available | SOCIT,15010,03,GR | 5000040039 | ||
Main Collection | TU External Storage-LCS | 005.82 SCH (Browse shelf) | 1 | Available | SOCIT, 546472 | 1001000997 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 | ||
Main Collection | TU External Storage-LCS | 005.82 SCH (Browse shelf) | 1 | Available | SOCIT, 546471 | 1001000996 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 |
Browsing Taylor's Library-TU Shelves Close shelf browser
No cover image available | ||||||||
005.82 MEN Handbook of applied cryptography / | 005.82 OPP 2011 Contemporary cryptography / | 005.82 RHE Internet security : | 005.82 SCH Applied cryptography : | 005.82 SCH Applied cryptography : | 005.82 SCH Applied cryptography : | 005.82 SIN The code book : |
Includes bibliographical references (p. 675-741) and index.
Contents in Brief : PART 1 CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols.- PART 11 CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. - PART 111 CRYPTOGRAPHIC ALGORITHMS. Mathematical background. Data Encryption Standard (DES). Other Block Ciphers. Still other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols.- PART 1V THE REAL WORLD. Example Implementations. Politics. Afterword by Matt Blaze .- PART V SOURCE CODE. References.