Applied cryptography : protocols, algorithms, and source code in C /
". . .The best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers ....
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
Wiley,
©1996.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Foreword / Whitfield Diffie
- 1. Foundations
- 2. Protocol Building Blocks
- 3. Basic Protocols
- 4. Intermediate Protocols
- 5. Advanced Protocols
- 6. Esoteric Protocols
- 7. Key Length
- 8. Key Management
- 9. Algorithm Types and Modes
- 10. Using Algorithms
- 11. Mathematical Background
- 12. Data Encryption Standard (DES)
- 13. Other Block Ciphers
- 14. Still Other Block Ciphers
- 15. Combining Block Ciphers
- 16. Pseudo-Random-Sequence Generators and Stream Ciphers
- 17. Other Stream Ciphers and Real Random-Sequence Generators
- 18. One-Way Hash Functions
- 19. Public-Key Algorithms
- 20. Public-Key Digital Signature Algorithms
- 21. Identification Schemes
- 22. Key-Exchange Algorithms
- 23. Special Algorithms for Protocols
- 24. Example Implementations
- 25. Politics
- Afterword / Matt Blaze.