EVERYDAY FREE SHIPPING on $25 & up - Excludes marketplace items & rentals.
EVERYDAY FREE SHIPPING on $25 & up - Excludes marketplace items & rentals.
EVERYDAY FREE SHIPPING on $25 & up - Excludes marketplace items & rentals
Search
Applied Cryptography : Protocols, Algorithms, and Source Code in C

Applied Cryptography : Protocols, Algorithms, and Source Code in C - 2nd edition

ISBN13: 978-0471117094

Cover of Applied Cryptography : Protocols, Algorithms, and Source Code in C 2ND 96 (ISBN 978-0471117094)
ISBN13: 978-0471117094
ISBN10: 0471117099
Cover type: Paperback
Edition/Copyright: 2ND 96
Publisher: John Wiley & Sons, Inc.
Published: 1996
International: No

List price: $60.00

Applied Cryptography : Protocols, Algorithms, and Source Code in C - 2ND 96 edition

ISBN13: 978-0471117094

Bruce Schneier

ISBN13: 978-0471117094
ISBN10: 0471117099
Cover type: Paperback
Edition/Copyright: 2ND 96
Publisher: John Wiley & Sons, Inc.

Published: 1996
International: No
Summary

Completely revised and updated to provide the successful programmer and systems designer with superlative guidelines regarding practical applications of contemporary cryptography. New features include in - depth treatment, fresh encryption algorithms, including the formerly secret GOST algorithm designed in Russia, more detailed material on incorporating algorithms, and programming fragments into working software, and the latest developments in the areas of message authentications and digital cash.

Author Bio

Schneier, Bruce : Counter-pane Systems

BRUCE SCHNEIER is President of Counter-pane Systems, a consulting firm specializing in cryptography and computer security. He is a contributing editor to Dr. Dobb's Journal, serves on the board of directors of the International Association of Cryptologic Research, and is a member of the Advisory Board for the Electronic Privacy Information Center. He is the author of E-Mail Security (Wiley) and is a frequent lecturer on cryptography, computer security, and privacy.

Table of Contents

CRYPTOGRAPHIC PROTOCOLS

Protocol Building Blocks.
Basic Protocols.
Intermediate Protocols.
Advanced Protocols.
Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES

Key Length.
Key Management.
Algorithm Types and Modes.
Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS

Data Encryption Standard (DES).
Other Block Ciphers.
Other Stream Ciphers and Real Random-Sequence Generators.
Public-Key Algorithms.
Special Algorithms for Protocols.

THE REAL WORLD

Example Implementations.
Politics.

SOURCE CODE

Source es Code.
Referenc