Table of Contents for
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
Close
Version ebook
/
Retour
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
by Bruce Schneier
Published by John Wiley & Sons, 2015
Cover Page
Title Page
Copyright
Contents
Introduction
Foreword
Preface
About the Author
CHAPTER 1: Foundations
PART I: CRYPTOGRAPHIC PROTOCOLS
CHAPTER 2: Protocol Building Blocks
CHAPTER 3: Basic Protocols
CHAPTER 4: Intermediate Protocols
CHAPTER 5: Advanced Protocols
CHAPTER 6: Esoteric Protocols
PART II: CRYPTOGRAPHIC TECHNIQUES
CHAPTER 7: Key Length
CHAPTER 8: Key Management
CHAPTER 9: Algorithm Types and Modes
CHAPTER 10: Using Algorithms
PART III: CRYPTOGRAPHIC ALGORITHMS
CHAPTER 11: Mathematical Background
CHAPTER 12: Data Encryption Standard (DES)
CHAPTER 13: Other Block Ciphers
CHAPTER 14: Still Other Block Ciphers
CHAPTER 15: Combining Block Ciphers
CHAPTER 16: Pseudo-Random-Sequence Generators and Stream Ciphers
CHAPTER 17: Other Stream Ciphers and Real Random-Sequence Generators
CHAPTER 18: One-Way Hash Functions
CHAPTER 19: Public-Key Algorithms
CHAPTER 20: Public-Key Digital Signature Algorithms
CHAPTER 21: Identification Schemes
CHAPTER 22: Key-Exchange Algorithms
CHAPTER 23: Special Algorithms for Protocols
PART IV: THE REAL WORLD
CHAPTER 24: Example Implementations
CHAPTER 25: Politics
Afterword by Matt Blaze
PART V: SOURCE CODE
References
Index
Next
Next Chapter
Title Page
Next
Next Chapter
Title Page