Applied Cryplography
Material type: TextPublication details: New Delhi John Wiley 2006Edition: 2ndDescription: 758pISBN:- 9788126513680
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Reference Book | Amity Central Library AIIT | Reference | 005.82 SCH-A (Browse shelf(Opens below)) | Not For Loan | 24702 | ||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24703 | |||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Checked out | 10/02/2017 | 24704 | ||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24705 | |||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24706 | |||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24707 | |||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24708 | |||
Books | Amity Central Library AIIT | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24709 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24711 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24712 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24713 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24715 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24716 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24717 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Available | 24718 | |||
Books | Amity Central Library ASET CSE | 005.82 SCH-A (Browse shelf(Opens below)) | Checked out | 30/04/2019 | 24719 |
Browsing Amity Central Library shelves, Shelving location: ASET CSE Close shelf browser (Hides shelf browser)
005.82 KAH-C Cryptography and Network Security | 005.82 KAH-C Cryptography and Network Security | 005.82 SCH-A Applied Cryplography | 005.82 SCH-A Applied Cryplography | 005.82 SCH-A Applied Cryplography | 005.82 SCH-A Applied Cryplography | 005.82 SCH-A Applied Cryplography |
Part I Cryptographic Protocols
· Protocol Building Blocks
· Basic Protocols
· Intermediate Protocols
· Advanced Protocols
· Esoteric Protocols
Part II Cryptographic Techniques
· Key Length
· Key Management
· Algorithm Types and Modes
· Using Algorithms
Part III Cryptographic Algorithms
· Data Encryption Standard (DES)
· Other Block Ciphers
· Other Stream Ciphers and Real Random-Sequence Generators
· Public-Key Algorithms
· Special Algorithms for Protocols
Part IV The Real World
· Example Implementations
· Politics
Part V Source Code
There are no comments on this title.