

Applied Cryptography
Book • 1996
This second edition of 'Applied Cryptography' provides a detailed overview of modern cryptography.
The book is divided into several parts, covering cryptographic protocols, algorithms, and techniques such as public key cryptography, digital signatures, key exchange, and digital cash.
It includes practical advice on implementing these algorithms in software and discusses various cryptographic techniques, including block ciphers like DES and public-key systems.
The book also covers real-world systems, politics, and the history of cryptography, making it both an introduction to the field and a comprehensive reference manual.
The book is divided into several parts, covering cryptographic protocols, algorithms, and techniques such as public key cryptography, digital signatures, key exchange, and digital cash.
It includes practical advice on implementing these algorithms in software and discusses various cryptographic techniques, including block ciphers like DES and public-key systems.
The book also covers real-world systems, politics, and the history of cryptography, making it both an introduction to the field and a comprehensive reference manual.
Mentioned by
Mentioned in 0 episodes
Mentioned by 

while discussing secure voting methods and the views of Bruce Schneier on paper ballots.


Jason Calacanis

E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
Mentioned by ![undefined]()

as one of his earlier works, focusing on mathematics and programming related to cryptography.

Bruce Schneier

Recode Decode: Bruce Schneier
Mentionné par ![undefined]()

lors de son récit sur ses expériences avec la cryptographie.

Jean-Philippe Aumasson

La Cryptographie déchiffrée