PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Applied Cryptography: Protocols, Algorithms,…
Cargando...

Applied Cryptography: Protocols, Algorithms, and Source Code in C (1996 original; edición 1993)

por Bruce Schneier (Autor)

MiembrosReseñasPopularidadValoración promediaMenciones
536445,604 (4.23)5
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography , the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.… (más)
Miembro:pracosta
Título:Applied Cryptography: Protocols, Algorithms, and Source Code in C
Autores:Bruce Schneier (Autor)
Información:Wiley (1993), Edition: 1, 618 pages
Colecciones:Tu biblioteca
Valoración:
Etiquetas:box45

Información de la obra

Applied Cryptography: Protocols, Algorithms, and Source Code in C por Bruce Schneier (Author) (1996)

Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

» Ver también 5 menciones

Mostrando 4 de 4
I wonder how many people remember the first release of Applied Cryptography, and all the hoops you had to jump through (to prove US Citizenship and residency) just to get the floppy disk with the source code. It was so amazing to watch the efforts to scan the pages to retrieve the source code, and share it, outside the US. In some cases, copies of the floppy disk may have found their way to others unable to see either the digital scans, or to acquire their own floppy.

Bruce graduated to the rarefied company occupied by others such as Phil Zimmerman, risking professional ruin, and imprisonment, by publishing this. I have the second edition as well, but this copy is one of my most prized possessions.

I should also point out that (assuming some basic math background, without which you aren't going to understand crypto anyway) this is an excellent resource on most of the popular algorithms of the day, and still useful to understand how it all works. ( )
  Lyndatrue | Jan 15, 2018 |
Indeholder "Foreword", "Preface", " How to Read This Book", " Acknowledgments", "Chapter 1. Foundations", " 1.1 Terminology", " 1.2 Classical Cryptography", " 1.3 Large Numbers", "Part One: Cryptographic Protocols", "Chapter 2. Protocol Building Blocks", " 2.1 Introduction to Protocols", " 2.2 Communications Using Secret-Key Cryptography", " 2.3 One-Way Functions", " 2.4 One-Way Hash Functions", " 2.5 Communications Using Public-Key Cryptography", " 2.6 Digital Signatures", " 2.7 Digital Signatures with Encryption", " 2.8 Random and Pseudo-Random Sequence Generation", "Chapter 3. Basic Protocols", " 3.1 Key Exchange", " 3.2 Authentication", " 3.3 Authentication and Key Exchange", " 3.4 Multiple-Key Public-Key Cryptography", " 3.5 Secret Splitting", " 3.6 Secret Sharing", " 3.7 Cryptographic Protection of Databases", " 3.8 Timestamping Services", "Chapter 4. Intermediate Protocols", " 4.1 Subliminal Channel", " 4.2 Undeniable Digital Signatures", " 4.3 Fail-Stop Digital Signatures", " 4.4 Group Signatures", " 4.5 Computing with Encrypted Data", " 4.6 Bit Commitment", " 4.7 Fair Coin Tosses", " 4.8 Mental Poker", "Chapter 5. Advanced Protocols", " 5.1 Fair Cryptosystems", " 5.2 All-or-Nothing Disclosure of Secrets", " 5.3 Zero-Knowledge Proofs of Knowledge", " 5.4 Zero-Knowledge Proofs of Identity", " 5.5 Blind Signatures", "Chapter 6. Esoteric Protocols", " 6.1 Oblivious Transfer", " 6.2 Simultaneous Contract Signing", " 6.3 Digital Certified Mail", " 6.4 Simultaneous Exchange of Secrets", " 6.5 Secure Elections", " 6.6 Secure Multiparty Computation", " 6.7 Digital Cash", " 6.8 Anonymous Message Broadcast", "Part Two: Cryptographic Techniques", "Chapter 7. Keys", " 7.1 Key Length", " 7.2 Key Management", " 7.3 Public-Key Key Management", "Chapter 8. Using Algorithms", " 8.1 Block Cipher Modes", " 8.2 Multiple Encryption", " 8.3 Stream Ciphers", " 8.4 Stream Ciphers vs. Block Ciphers", " 8.5 Public-Key Cryptography vs. Symmetric Cryptography", " 8.6 Encrypting Communications Networks", " 8.7 Encrypting Data for Storage", " 8.8 Hardware Encryption vs. Software Encryption", " 8.9 File Erasure", " 8.10 Choosing an Algorithm", "Part Three: Cryptographic Algorithms", "Chapter 9. Mathematical Background", " 9.1 Information Theory", " 9.2 Complexity Theory", " 9.3 Number Theory", " 9.4 Prime Numbers", " 9.5 Discrete Logarithms in a Finite Field", "Chapter 10. Data Encryption Standard (DES)", " 10.1 Data Encryption Standard (DES)", " 10.2 DES Variants", "Chapter 11. Other Block Algorithms", " 11.1 Lucifer", " 11.2 Madryga", " 11.3 NewDES", " 11.4 FEAL N", " 11.5 REDOC", " 11.6 LOKI", " 11.7 Khufu and Khafre", " 11.8 RC2 and RC4", " 11.9 IDEA", " 11.10 MMB", " 11.11 CA-1.1", " 11.12 Skipjack", " 11.13 Using One-Way Hash Functions", " 11.14 Other Block Algorithms", " 11.15 Which Block Algorithm is Best?", "Chapter 12. Public-Key Algorithms", " 12.1 Background", " 12.2 Diffie-Hellman", " 12.3 Knapsack Algorithms", " 12.4 RSA", " 12.5 Pohig-Hellman", " 12.6 Rabin", " 12.7 Feige-Fiat-Shamir", "Chapter 13. More Public-Key Algorithms", " 13.1 Guillou-Quisquater", " 13.2 Ong-Schnoor-Shamir", " 13.3 ElGamal", " 13.4 Schnoor", " 13.5 Digital Signature Algorithm (DSA)", " 13.6 ENSIGN", " 13.7 McEliece", " 13.8 Okamoto 92", " 13.9 Cellular Automata", " 13.10 Elliptic Curve Cryptosystems", " 13.11 Other Public-Key Algorithms", " 13.12 Which Public-Key Algorithm is Best?", "Chapter 14. One-Way Hash Functions", " 14.1 Background", " 14.2 Snefru", " 14.3 N-Hash", " 14.4 MD4", " 14.5 MD5", " 14.6 MD2", " 14.7 Secure Hash Algorithm (SHA)", " 14.8 Ripe-MD", " 14.9 HAVAL", " 14.10 Other One-Way Hash Functions", " 14.11 Using Symmetric Block Algorithms", " 14.12 Using Public-Key Algorithms", " 14.13 Which One-Way Hash Function is Best?", " 14.14 Key-Dependent One-Way Hash Functions", "Chapter 15. Random Sequence Generators and Stream Ciphers", " 15.1 Pseudo-Random Sequence Generators", " 15.2 Stream Ciphers", " 15.3 Real Random Sequence Generators", " 15.4 Generating Numbers and Non-Uniform Distributions", " 15.5 Generating Random Permutations", "Chapter 16: Special Algorithms for Protocols", " 16.1 Key Exchange", " 16.2 Encrypted Key Exchange", " 16.3 Multiple-Key Public-Key Cryptography", " 16.4 Secret Broadcasting", " 16.5 Secret Sharing Algorithms", " 16.6 Subliminal Channel", " 16.7 Undeniable Digital Signatures", " 16.8 Computing with Encrypted Data", " 16.9 Fair Coin Flips", " 16.10 Fair Cryptosystems", " 16.11 All-or-Nothing Disclosure of Secrets", " 16.12 Zero-Knowledge Proofs of Knowledge", " 16.13 Blind Signatures", " 16.14 Oblivious Transfer", " 16.15 Secure Multiparty Computation", " 16.16 Probabilistic Encryption", " 16.17 Quantum Cryptography", "Part Four: The Real World", "Chapter 17. Example Implementations", " 17.1 IBM Secret-Key Management Protocol", " 17.2 Mitrenet", " 17.3 ISDN", " 17.4 Kerberos", " 17.5 KryptoKnight", " 17.6 ISO Authentication Framework", " 17.7 Privacy Enhanced Mail (PEM)", " 17.8 Message Security Protocol (MSP)", " 17.9 Pretty Good Privacy (PGP)", " 17.10 Clipper", " 17.11 Capstone", "Chapter 18. Politics", " 18.1 National Security Agency (NSA)", " 18.2 National Computer Security Center (NCSC)", " 18.3 National Institute of Standards and Technology (NIST)", " 18.4 RSA Data Security, Inc.", " 18.5 International Association of Cryptographic Research (IACR)", " 18.6 sci.crypt", " 18.7 Cypherpunks", " 18.8 Research and Development in Advanced Communication Technologies in Europe (RACE)", " 18.9 Electronic Frontier Foundation (EFF)", " 18.10 Computer Professionals for Social Responsibility (CPSR)", " 18.11 Patents", " 18.12 Export Rules", " 18.13 Legal Issues", "Part Five: Source Code", " Vigenere, Beauford, Variant Beauford", " Enigma", " DES", " Lucifer", " NewDES", " FEAL-8", " FEAL-NX", " REDOC III", " LOKI 91", " IDEA", " N-HASH", " MD5", " SHA (Secure Hash Algorithm)", " Secret Sharing", "References", "Index".

Gimrende bog om kryptologi, men der er kommet en nyere udgave. ( )
  bnielsen | Feb 24, 2016 |
Really excellent. On par with any classic manual of computer science. ( )
  wweisser | Jul 6, 2013 |
QA76.9 .A25 S35 (IP)
  Farella | Jan 15, 2013 |
Mostrando 4 de 4
sin reseñas | añadir una reseña
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Acontecimientos importantes
Películas relacionadas
Epígrafe
Dedicatoria
Primeras palabras
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files.
Citas
Últimas palabras
Aviso de desambiguación
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
This is the original, 1996 edition of the book. Please do not combine with the Second Edition.
Editores de la editorial
Blurbistas
Idioma original
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
DDC/MDS Canónico
LCC canónico
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography , the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (4.23)
0.5
1
1.5 1
2
2.5
3 4
3.5 1
4 21
4.5 1
5 17

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 206,485,157 libros! | Barra superior: Siempre visible