Text
Applied cryptography: protocols, algorithms, and source code in C
Contents:
Chapter 1—Foundations
Part I—Cryptographic Protocols
Chapter 2—Protocol Building Blocks
Chapter 3—Basic Protocols
Chapter 4—Intermediate Protocols
Chapter 5—Advanced Protocols
Chapter 6—Esoteric Protocols
Part II—Cryptographic Techniques
Chapter 7—Key Length
Chapter 8—Key Management
Chapter 9—Algorithm Types and Modes
Chapter 10—Using Algorithms
Part III—Cryptographic Algorithms
Chapter 11—Mathematical Background
Chapter 12—Data Encryption Standard (DES)
Chapter 13—Other Block Ciphers
Chapter 14—Still Other Block Ciphers
Chapter 15—Combining Block Ciphers
Chapter 16—Pseudo-Random-Sequence Generators and Stream Ciphers
Chapter 17—Other Stream Ciphers and Real Random-Sequence Generators
Chapter 18—One-Way Hash Functions
Chapter 19—Public-Key Algorithms
Chapter 20—Public-Key Digital Signature Algorithms
Chapter 21—Identification Schemes
Chapter 23—Special Algorithms for Protocols
Part IV—The Real World
Chapter 24—Example Implementations
Chapter 25—Politics
25.1 National Security Agency (NSA)
25.2 National Computer Security Center (NCSC)
25.3 National Institute of Standards and Technology (NIST)
25.4 RSA Data Security, Inc. 25.5 Public Key Partners
25.6 International Association for Cryptologic Research (IACR)
25.7 RACE Integrity Primitives Evaluation (RIPE) 25.8 Conditional Access for Europe (CAFE)
25.9 ISO/IEC 9979
25.10 Professional, Civil Liberties, and Industry Groups 25.11 Sci.crypt
25.12 Cypherpunks
25.13 Patents
25.14 U.S. Export Rules
25.15 Foreign Import and Export of Cryptography 25.16 Legal Issues
No other version available