Cryptography engineering [electronic resource] : design principles and practical applications / Tadayoshi Kohno, Niels Ferguson, Bruce Schneier.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start.

Saved in:
Bibliographic Details
Online Access: Full Text (via Wiley)
Main Author: Kohno, Tadayoshi
Other Authors: Ferguson, Niels, Schneier, Bruce, 1963-
Format: Electronic eBook
Language:English
Published: Indianapolis, IN : Wiley Pub., Inc., ©2010.
Subjects:

MARC

LEADER 00000cam a2200000 a 4500
001 b12941464
003 CoU
006 m o d
007 cr |||||||||||
008 120814s2010 inua ob 001 0 engod
005 20230727223301.2
019 |a 965422899  |a 992927351  |a 1096428380  |a 1100624716  |a 1164344144 
020 |a 9781118722367  |q (electronic bk.) 
020 |a 1118722361  |q (electronic bk.) 
020 |a 9781118502822  |q (electronic bk.) 
020 |a 1118502825  |q (electronic bk.) 
020 |a 9781118080917  |q (electronic bk.) 
020 |a 1118080912  |q (electronic bk.) 
020 |z 9780470474242 
020 |z 0470474246 
035 |a (OCoLC)wol806039884 
035 |a (OCoLC)806039884  |z (OCoLC)965422899  |z (OCoLC)992927351  |z (OCoLC)1096428380  |z (OCoLC)1100624716  |z (OCoLC)1164344144 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d E7B  |d EBLCP  |d OCLCQ  |d OCLCF  |d DEBSZ  |d OCLCQ  |d TEFOD  |d ZCU  |d OCLCQ  |d TEFOD  |d DG1  |d OCLCQ  |d DEBBG  |d YDX  |d OCLCO  |d DG1  |d LIP  |d OCLCA  |d OCLCQ  |d OCLCA  |d KIJ  |d OCLCQ  |d CEF  |d OCLCA  |d YOU  |d UAB  |d U3W  |d K6U  |d OCLCO  |d OCLCQ  |d D6H  |d COO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCQ  |d OCLCO  |d AAA  |d OCLCO  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25  |b F466 2010eb 
100 1 |a Kohno, Tadayoshi.  |0 http://id.loc.gov/authorities/names/no2010049587  |1 http://isni.org/isni/0000000077579592 
245 1 0 |a Cryptography engineering  |h [electronic resource] :  |b design principles and practical applications /  |c Tadayoshi Kohno, Niels Ferguson, Bruce Schneier. 
260 |a Indianapolis, IN :  |b Wiley Pub., Inc.,  |c ©2010. 
300 |a 1 online resource (xxix, 353 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction. The Context of Cryptography / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Introduction to Cryptography / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Message Security. Block Ciphers / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Block Cipher Modes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Hash Functions / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Message Authentication Codes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- The Secure Channel / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Implementation Issues (I) / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Negotiation. Generating Randomness / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Primes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Diffie-Hellman / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- RSA / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Introduction to Cryptographic Protocols / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Negotiation / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Implementation Issues (II) / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Management. The Clock / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Servers / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- The Dream of PKI / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- PKI Reality / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- PKI Practicalities / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Storing Secrets / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Miscellaneous. Standards and Patents / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Involving Experts / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno. 
520 8 |a Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start. 
588 0 |a Print version record. 
650 0 |a Cryptography.  |0 http://id.loc.gov/authorities/subjects/sh85034453 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552. 
700 1 |a Ferguson, Niels.  |0 http://id.loc.gov/authorities/names/no2003075619  |1 http://isni.org/isni/0000000110250300 
700 1 |a Schneier, Bruce,  |d 1963-  |0 http://id.loc.gov/authorities/names/n93043083  |1 http://isni.org/isni/0000000108560158 
776 0 8 |i Print version:  |a Kohno, Tadayoshi.  |t Cryptography engineering.  |d Indianapolis, IN : Wiley Pub., inc., ©2010  |z 9780470474242  |w (DLC) 2010920648  |w (OCoLC)436030574. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367  |z Full Text (via Wiley) 
907 |a .b129414645  |b 06-07-23  |c 06-07-23 
915 |a - 
944 |a MARS - RDA ENRICHED 
998 |a web  |b  - -   |c f  |d b   |e -  |f eng  |g inu  |h 0  |i 1 
956 |a Wiley Online Library eBooks 
956 |b Wiley Online Library: Complete oBooks 
999 f f |i 1fb3e857-2881-5936-af79-022ad85c3f70  |s fbe497a8-6cb7-542d-a952-9a253cc053f2 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 F466 2010eb  |h Library of Congress classification  |i web  |n 1