Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    "Applied Cryptography. Protocols, Algorithms and Source Code in C" by Bruce Schneier

    Posted By: exLib
    "Applied Cryptography. Protocols, Algorithms and Source Code in C" by  Bruce Schneier

    "Applied Cryptography. Protocols, Algorithms and Source Code in C" by Bruce Schneier
    Second Edition, 20th Anniversary Edition
    Wilеy | 1996/2015 | ISBN: 1119096723 0471117099 9781119096726 | 761 pages | PDF | 371 MB

    This book provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages – to maintain the privacy of computer data.

    The boob describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

    Contents
    Introduction
    Foreword By Whitfield Diffie
    Preface
    About the Author
    1. Foundations
    PART I. CRYPTOGRAPHIC PROTOCOLS
    2. Protocol Building Blocks
    3. Basic Protocols
    4. Intermediate Protocols
    5. Advanced Protocols
    6. Esoteric Protocols
    PART II. CRYPTOGRAPHIC TECHNIQUES
    7. Key Length
    8. Key Management
    9. Algorithm Types and Modes
    10. Using Algorithms
    PART III. CRYPTOGRAPHIC ALGORITHMS
    11. Mathematical Background
    12. Data Encryption Standard (DES)
    13. Other Block Ciphers
    14. Still Other Block Ciphers
    15. Combining Block Ciphers
    16. Pseudo-Random-Sequence Generators and Stream Ciphers
    17. Other Stream Ciphers and Real Random-Sequence Generators
    18. One-Way Hash Functions
    19. Public-Key Algorithms
    20. Public-Key Digital Signature Algorithms
    21. Identification Schemes
    22. Key-Exchange Algorithms
    23. Special Algorithms for Protocols
    PART IV. THE REAL WORLD
    24. Example Implementations
    25. Politics
    Afterword by Matt Blaze
    PART V. SOURCE CODE
    References
    Index
    PDF with TOC BookMarkLinks
    NitroF
    FilDwn • | • RGator • | • DepositF • | • UpCh

    WayUp • | • HiFi • | • SiBi • | • TuBi