| 000 | 03139cam a2200409 i 4500 | ||
|---|---|---|---|
| 999 |
_c10179 _d10179 |
||
| 001 | 670601 | ||
| 005 | 20230604100447.0 | ||
| 008 | 950327s1996 nyua b 001 0 eng | ||
| 010 | _a 95012398 | ||
| 020 | _a9780471117094 | ||
| 020 | _a0471128457 | ||
| 020 | _a0471117099 | ||
| 040 |
_aDLC _cDLC _dDLC _erda |
||
| 050 | 0 | 4 |
_aQA76.9.A25 _bS35 1996 |
| 082 | 0 | 0 |
_a005.82 _222 _bS.B.A |
| 100 | 1 |
_aSchneier, Bruce, _d1963-, _eauthor |
|
| 245 | 1 | 0 |
_aApplied cryptography : _bprotocols, algorithms, and source code in C / _cBruce Schneier. |
| 250 | _a2nd edition | ||
| 264 | 1 |
_aNew York : _bWiley, _c[1996] |
|
| 300 |
_axxiii, 758 pages : _billustrations ; _c24 cm |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 500 | _acomputer bookfair2016 | ||
| 504 | _aIncludes bibliographical references (pages 675-741) and index. | ||
| 505 | 0 | _aForeword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze. | |
| 520 | _aThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aTelecommunication _xSecurity measures. |
|
| 650 | 0 |
_aCryptography. _91154 |
|
| 856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/bios/wiley041/95012398.html |
| 856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/description/wiley032/95012398.html |
| 856 | 4 |
_3Table of Contents _uhttp://www.loc.gov/catdir/toc/onix02/95012398.html |
|
| 942 |
_2ddc _cBK |
||