Applied cryptography :
Schneier, Bruce,
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. - 2nd ed. - New Delhi : Wiley, 2007 - xxiii, 758 p. ill. ; 24 cm.
Includes bibliographical references (p. 675-741) and index.
1. Partial table of contents:
2. Cryptographic protocols.
3. Protocol building blocks.
4. Basic protocols.
5. Intermediate protocols.
6. Advanced protocols.
7. Esoteric protocols.
8. Cryptographic techniques.
9. Key length.
10. Key management.
11. Algorithm types and modes.
12. Using algorithms.
13. Cryptographic algorithms.
14. Data encryption standard (des).
15. Other block ciphers.
16. Other stream ciphers and real random-sequence generators.
17. Public-key algorithms.
18. Special algorithms for protocols.
19. The real world.
20. Example implementations.
21. Politics.
22. Source code.source code.
9788126513680
Computer security.
Telecommunication--Security measures.
Cryptography.
005.8/2 / S3598
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier. - 2nd ed. - New Delhi : Wiley, 2007 - xxiii, 758 p. ill. ; 24 cm.
Includes bibliographical references (p. 675-741) and index.
1. Partial table of contents:
2. Cryptographic protocols.
3. Protocol building blocks.
4. Basic protocols.
5. Intermediate protocols.
6. Advanced protocols.
7. Esoteric protocols.
8. Cryptographic techniques.
9. Key length.
10. Key management.
11. Algorithm types and modes.
12. Using algorithms.
13. Cryptographic algorithms.
14. Data encryption standard (des).
15. Other block ciphers.
16. Other stream ciphers and real random-sequence generators.
17. Public-key algorithms.
18. Special algorithms for protocols.
19. The real world.
20. Example implementations.
21. Politics.
22. Source code.source code.
9788126513680
Computer security.
Telecommunication--Security measures.
Cryptography.
005.8/2 / S3598