Damian Brunold

Bruce Schneier: Applied Cryptography, Second Edition

Kryptographie, Programmieren

Inhaltsverzeichnis

  1. Foundations
  2. Protocol Building Blocks
  3. Basic Protocols
  4. Intermediate Protocols
  5. Advanced Protocols
  6. Esoteric Protocols
  7. Key Length
  8. Key Management
  9. Algorithm Types and Modes
  10. Using Algorithms
  11. Mathematical Background
  12. Data Encryption Standard (DES)
  13. Other Block Ciphers
  14. Still Other Block Ciphers
  15. Combining Block Ciphers
  16. Pseudo-Random-Sequence Generators and Stream Ciphers
  17. Other Stream Ciphers and Real Random-Sequence Generators
  18. One-Way Hash Functions
  19. Public-Key Algorithms
  20. Public-Key Digital Signature Algorithms
  21. Identification Schemes
  22. Key-Exchange Algorithms
  23. Special Algorithms for Protocols
  24. Example Implementations
  25. Politics

Amazon.deAmazon.com