000 03139cam a2200409 i 4500
999 _c10179
_d10179
001 670601
005 20230604100447.0
008 950327s1996 nyua b 001 0 eng
010 _a 95012398
020 _a9780471117094
020 _a0471128457
020 _a0471117099
040 _aDLC
_cDLC
_dDLC
_erda
050 0 4 _aQA76.9.A25
_bS35 1996
082 0 0 _a005.82
_222
_bS.B.A
100 1 _aSchneier, Bruce,
_d1963-,
_eauthor
245 1 0 _aApplied cryptography :
_bprotocols, algorithms, and source code in C /
_cBruce Schneier.
250 _a2nd edition
264 1 _aNew York :
_bWiley,
_c[1996]
300 _axxiii, 758 pages :
_billustrations ;
_c24 cm
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
500 _acomputer bookfair2016
504 _aIncludes bibliographical references (pages 675-741) and index.
505 0 _aForeword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze.
520 _aThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
650 0 _aComputer security.
650 0 _aTelecommunication
_xSecurity measures.
650 0 _aCryptography.
_91154
856 4 2 _3Contributor biographical information
_uhttp://www.loc.gov/catdir/bios/wiley041/95012398.html
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/description/wiley032/95012398.html
856 4 _3Table of Contents
_uhttp://www.loc.gov/catdir/toc/onix02/95012398.html
942 _2ddc
_cBK