Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.
Material type: TextPublication details: New Delhi : Wiley, 2007Edition: 2nd edDescription: xxiii, 758 p. ill. ; 24 cmISBN:- 9788126513680
- 005.8/2 20 S3598
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | UE-Central Library | 005.82 S3598 (Browse shelf(Opens below)) | Available | T2021 |
Browsing UE-Central Library shelves Close shelf browser (Hides shelf browser)
005.8 W476 Managing Cisco network security | 005.8 Y21 Security in wireless mesh networks | 005.82 H763 Beginning cryptography with Java | 005.82 S3598 Applied cryptography : | 005.82 S7827 Cryptography and network security : | 005.82 S7827 Cryptography and network security : | 005.82 S7827 Cryptography and network security : |
Includes bibliographical references (p. 675-741) and index.
1. Partial table of contents:
2. Cryptographic protocols.
3. Protocol building blocks.
4. Basic protocols.
5. Intermediate protocols.
6. Advanced protocols.
7. Esoteric protocols.
8. Cryptographic techniques.
9. Key length.
10. Key management.
11. Algorithm types and modes.
12. Using algorithms.
13. Cryptographic algorithms.
14. Data encryption standard (des).
15. Other block ciphers.
16. Other stream ciphers and real random-sequence generators.
17. Public-key algorithms.
18. Special algorithms for protocols.
19. The real world.
20. Example implementations.
21. Politics.
22. Source code.source code.
There are no comments on this title.