Applied cryptography : protocols, algorithms, and source code in C /
". . .The best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers ....
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
New York :
Wiley,
©1996.
|
Edition: | 2nd ed. |
Subjects: | |
Online Access: | CONNECT CONNECT |
Table of Contents:
- Foreword / Whitfield Diffie
- 1. Foundations
- 2. Protocol Building Blocks
- 3. Basic Protocols
- 4. Intermediate Protocols
- 5. Advanced Protocols
- 6. Esoteric Protocols
- 7. Key Length
- 8. Key Management
- 9. Algorithm Types and Modes
- 10. Using Algorithms
- 11. Mathematical Background
- 12. Data Encryption Standard (DES)
- 13. Other Block Ciphers
- 14. Still Other Block Ciphers
- 15. Combining Block Ciphers
- 16. Pseudo-Random-Sequence Generators and Stream Ciphers
- 17. Other Stream Ciphers and Real Random-Sequence Generators
- 18. One-Way Hash Functions
- 19. Public-Key Algorithms
- 20. Public-Key Digital Signature Algorithms
- 21. Identification Schemes
- 22. Key-Exchange Algorithms
- 23. Special Algorithms for Protocols
- 24. Example Implementations
- 25. Politics
- Afterword / Matt Blaze.