TY - BOOK AU - Schneier,Bruce TI - Applied cryptography: protocols, algorithms, and source code in C SN - 0471117099 U1 - 005.82 PY - 1996/// CY - New York PB - Wiley KW - Computer security KW - Cryptography KW - Telecommunication KW - Security measures N1 - Includes bibliographical references (p. 675-741) and index; Contents in Brief : PART 1 CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols.- PART 11 CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. - PART 111 CRYPTOGRAPHIC ALGORITHMS. Mathematical background. Data Encryption Standard (DES). Other Block Ciphers. Still other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols.- PART 1V THE REAL WORLD. Example Implementations. Politics. Afterword by Matt Blaze .- PART V SOURCE CODE. References ER -