The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: All aspects of Twofish's design and anatomy Twofish performance and testing results Step-by-step instructions on how to use it in your systems Complete source code, in C, for implementing Twofish On the companion Web site you'll find: A direct link to Counterpane Systems for updates on Twofish A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium For updates on Twofish and the AES process, visit these sites: www wiley.com/compbooks/schneier www counterpane. com www nist.gov/aes Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www wiley.com/compbooks/ Visit the companion Web site at www wiley.com/compbooks/schneierAbout the Author:
BRUCE SCHNEIER is President of Counterpane Systems, a worldwide cryptography and information security consulting firm. A world-renowned expert on computer cryptography, Mr. Schneier is the inventor of Blowfish, a cryptography method built into more than 100 commercial products which continues unbroken. He is also the author of the bestselling Applied Cryptography (also available from Wiley). JOHN KELSEY, DAVID WAGNER, CHRIS HALL, and NIELS FERGUSON are well-known cryptographers and Counterpane consultants. DOUG WHITING is a security scientist with Hi/fn, a company specializing in compression technology.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Wiley, 1999. Hardcover. Estado de conservación: New. 1. Nº de ref. de la librería DADAX0471353817
Descripción Wiley 1999-03-22, 1999. Hardcover. Estado de conservación: New. 1. 0471353817. Nº de ref. de la librería 499260
Descripción Wiley, 1999. Hardcover. Estado de conservación: New. New item. Nº de ref. de la librería QX-026-71-6636406
Descripción Wiley, 1999. Hardcover. Estado de conservación: New. book. Nº de ref. de la librería 471353817
Descripción Wiley. Hardcover. Estado de conservación: New. 0471353817 New Condition. Nº de ref. de la librería NEW6.0247742
Descripción Wiley, 1999. Hardcover. Estado de conservación: New. Nº de ref. de la librería P110471353817
Descripción Wiley, 1999. Estado de conservación: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Twofish Design Goals.Twofish Building Blocks.Twofish.Performance of Twofish.Twofish Design Philosophy.The Design of Twofish.Design of the Twofish Key Schedule.Cryptanalysis of Twofish.Using Twofish.Historical Remarks.Conclusions and Further Work.References.Index. Nº de ref. de la librería ABE_book_new_0471353817