Normal view MARC view ISBD view

Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

By: Schneier, Bruce, 1963-.
Publisher: New York : Wiley, c1996Edition: 2nd ed.Description: xxiii, 758 p. : ill. ; 24 cm.ISBN: 0471117099.Subject(s): Computer security | Cryptography | Telecommunication -- Security measuresDDC classification: 005.82
Contents:
Contents in Brief : PART 1 CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols.- PART 11 CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. - PART 111 CRYPTOGRAPHIC ALGORITHMS. Mathematical background. Data Encryption Standard (DES). Other Block Ciphers. Still other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols.- PART 1V THE REAL WORLD. Example Implementations. Politics. Afterword by Matt Blaze .- PART V SOURCE CODE. References.
Item type Current location Shelf location Call number Copy number Status Notes Date due Barcode Remark
Main Collection Taylor's Library-TU

Floor 3, Shelf 2 , Side 1, TierNo 2, BayNo 1

005.82 SCH (Browse shelf) 1 Available SOCIT,15010,03,GR 5000040039
Main Collection TU External Storage-LCS
005.82 SCH (Browse shelf) 1 Available SOCIT, 546472 1001000997 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1
Main Collection TU External Storage-LCS
005.82 SCH (Browse shelf) 1 Available SOCIT, 546471 1001000996 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

Includes bibliographical references (p. 675-741) and index.

Contents in Brief : PART 1 CRYPTOGRAPHIC PROTOCOLS. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols.- PART 11 CRYPTOGRAPHIC TECHNIQUES. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. - PART 111 CRYPTOGRAPHIC ALGORITHMS. Mathematical background. Data Encryption Standard (DES). Other Block Ciphers. Still other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols.- PART 1V THE REAL WORLD. Example Implementations. Politics. Afterword by Matt Blaze .- PART V SOURCE CODE. References.