Applied cryptography : protocols, algorithms, and source code in C Bruce Schneier.
Material type:
- 0471128457 (cloth : acid-free paper)
- 0471117099 (paper : acid-free paper)
- 005.8/2 20
- QA76.9.A25 S35 1996
Item type | Current library | Collection | Call number | Status | Notes | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Air University Central Library Islamabad Computer Science | NFIC | 005.8 SCH (Browse shelf(Opens below)) | Available | Program Relevancy: BSCS; Course Relevancy; Network and Information Security. | P11649 | |
![]() |
Air University Central Library Islamabad Computer Science | NFIC | 005.8 SCH (Browse shelf(Opens below)) | Available | Program Relevancy: BSCS; Course Relevancy; Network and Information Security. | P11650 |
Browsing Air University Central Library Islamabad shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 REI Biometrics for network security / | 005.8 RON Ccsp cisco secure vpn exam certification guide / | 005.8 SCH Applied cryptography : protocols, algorithms, and source code in C | 005.8 SCH Applied cryptography : protocols, algorithms, and source code in C | 005.8 SEC Security in wireless mesh networks | 005.8 SIP Sip security | 005.8 STA Cryptography and network security : |
Includes bibliographical references (p. 675-741) and index.
Foreword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze.
There are no comments on this title.