Amazon cover image
Image from Amazon.com

Applied cryptography : protocols, algorithms, and source code in C Bruce Schneier.

By: Material type: TextPublication details: New York : Wiley, 2006.Edition: 2nd edDescription: xxiii, 758 pISBN:
  • 0471128457 (cloth : acid-free paper)
  • 0471117099 (paper : acid-free paper)
Subject(s): DDC classification:
  • 005.8/2 20
LOC classification:
  • QA76.9.A25 S35 1996
Contents:
Foreword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Barcode
Book Air University Central Library Islamabad Computer Science NFIC 005.8 SCH (Browse shelf(Opens below)) Available Program Relevancy: BSCS; Course Relevancy; Network and Information Security. P11649
Book Air University Central Library Islamabad Computer Science NFIC 005.8 SCH (Browse shelf(Opens below)) Available Program Relevancy: BSCS; Course Relevancy; Network and Information Security. P11650

Includes bibliographical references (p. 675-741) and index.

Foreword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze.

There are no comments on this title.

to post a comment.
Air University Sector E-9, Islamabad Pakistan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631