TY - BOOK AU - Schneier,Bruce TI - Applied cryptography : : protocols, algorithms, and source code in C / SN - 9788126513680 U1 - 005.8/2 20 PY - 2007/// CY - New Delhi PB - Wiley KW - Computer security KW - Telecommunication KW - Security measures KW - Cryptography N1 - Includes bibliographical references (p. 675-741) and index; 1. Partial table of contents: 2. Cryptographic protocols. 3. Protocol building blocks. 4. Basic protocols. 5. Intermediate protocols. 6. Advanced protocols. 7. Esoteric protocols. 8. Cryptographic techniques. 9. Key length. 10. Key management. 11. Algorithm types and modes. 12. Using algorithms. 13. Cryptographic algorithms. 14. Data encryption standard (des). 15. Other block ciphers. 16. Other stream ciphers and real random-sequence generators. 17. Public-key algorithms. 18. Special algorithms for protocols. 19. The real world. 20. Example implementations. 21. Politics. 22. Source code.source code ER -