Table of contents for Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.


Bibliographic record and links to related information available from the Library of Congress catalog


Information from electronic data provided by the publisher. May be incomplete or contain other coding.


Counter
Partial table of contents:
CRYPTOGRAPHIC PROTOCOLS.
Protocol Building Blocks.
Basic Protocols.
Intermediate Protocols.
Advanced Protocols.
Esoteric Protocols.
CRYPTOGRAPHIC TECHNIQUES.
Key Length.
Key Management.
Algorithm Types and Modes.
Using Algorithms.
CRYPTOGRAPHIC ALGORITHMS.
Data Encryption Standard (DES).
Other Block Ciphers.
Other Stream Ciphers and Real Random-Sequence Generators.
Public-Key Algorithms.
Special Algorithms for Protocols.
THE REAL WORLD.
Example Implementations.
Politics.
SOURCE CODE.source Code.
References.


Library of Congress subject headings for this publication: Computer security, Telecommunication Security measures, Cryptography