Kohno, Tadayoshi.

Cryptography engineering design principles and practical applications Tadayoshi Kohno, Niels Ferguson, Bruce Schneier. - Indianapolis, IN Wiley Pub. 2010. - xxix;353 p. illustrations

Includes bibliographical references and index.

Introduction. The Context of Cryptography / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Introduction to Cryptography / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Message Security. Block Ciphers / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Block Cipher Modes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Hash Functions / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Message Authentication Codes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- The Secure Channel / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Implementation Issues (I) / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Negotiation. Generating Randomness / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Primes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Diffie-Hellman / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- RSA / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Introduction to Cryptographic Protocols / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Negotiation / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Implementation Issues (II) / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Management. The Clock / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Servers / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- The Dream of PKI / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- PKI Reality / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- PKI Practicalities / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Storing Secrets / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Miscellaneous. Standards and Patents / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Involving Experts / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start.

9780470474242

5063.00

D7FC186E-2725-4ABA-912F-A06CDC981A1F OverDrive, Inc. http://www.overdrive.com


Cryptography.
Computer security.
COMPUTERS--Security--Cryptography.
Computer security.
Cryptography.
Computersicherheit
Kryptologie


Electronic books.
Electronic books.

QA76.9.A25 / F466 2010eb

005.8/2