Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

"Applied Cryptography. Protocols, Algorithms and Source Code in C" by Bruce Schneier

Posted By: exLib
"Applied Cryptography. Protocols, Algorithms and Source Code in C" by  Bruce Schneier

"Applied Cryptography. Protocols, Algorithms and Source Code in C" by Bruce Schneier
Second Edition, 20th Anniversary Edition
Wilеy | 1996/2015 | ISBN: 1119096723 0471117099 9781119096726 | 761 pages | PDF | 371 MB

This book provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages – to maintain the privacy of computer data.

The boob describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

Contents
Introduction
Foreword By Whitfield Diffie
Preface
About the Author
1. Foundations
PART I. CRYPTOGRAPHIC PROTOCOLS
2. Protocol Building Blocks
3. Basic Protocols
4. Intermediate Protocols
5. Advanced Protocols
6. Esoteric Protocols
PART II. CRYPTOGRAPHIC TECHNIQUES
7. Key Length
8. Key Management
9. Algorithm Types and Modes
10. Using Algorithms
PART III. CRYPTOGRAPHIC ALGORITHMS
11. Mathematical Background
12. Data Encryption Standard (DES)
13. Other Block Ciphers
14. Still Other Block Ciphers
15. Combining Block Ciphers
16. Pseudo-Random-Sequence Generators and Stream Ciphers
17. Other Stream Ciphers and Real Random-Sequence Generators
18. One-Way Hash Functions
19. Public-Key Algorithms
20. Public-Key Digital Signature Algorithms
21. Identification Schemes
22. Key-Exchange Algorithms
23. Special Algorithms for Protocols
PART IV. THE REAL WORLD
24. Example Implementations
25. Politics
Afterword by Matt Blaze
PART V. SOURCE CODE
References
Index
PDF with TOC BookMarkLinks
NitroF
FilDwn • | • RGator • | • DepositF • | • UpCh

WayUp • | • HiFi • | • SiBi • | • TuBi