Applied cryptography: protocols, algorithms, and source code in CAfter a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes presentday applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half. 
From inside the book
40 pages matching zeroknowledge in this book
Page 576
Where's the rest of this book?
Results 13 of 40
What people are saying  Write a review
User ratings
5 stars 
 
4 stars 
 
3 stars 
 
2 stars 
 
1 star 

Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C
User Review  Freddie BarrSmith  GoodreadsElegant explanations of cryptographic protocols but too dated to be of much practical use now. Read full review
Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C
User Review  Nana  Goodreadshttps://www.goodreads.com/book/show/3... Read full review
Other editions  View all
Applied cryptography: protocols, algorithms, and source code in C Bruce Schneier No preview available  2007 
Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier No preview available  2015 
Common terms and phrases
Alice and Bob Alice encrypts Alice sends authentication bank block algorithm block cipher Bob's public key break bruteforce attack bytes Carol cheat chips choose ciphertext complexity cryptographic algorithm cryptosystem database Dave decrypts the message differential cryptanalysis digital signature document encrypted message encryption and decryption encryption key example factor Figure hardware identity implementation input integer Kerberos keystream knapsack machine Mallet mode modulo money order onetime pad oneway function oneway hash function operations output password Peggy permutation plaintext plaintext block polynomial possible prime numbers private key problem protocol pseudorandom public key publickey algorithms publickey cryptography quadratic residue random bit random number random string result round Sboxes scheme secret key Section sends Bob sequence session key standard step stream ciphers subblocks timestamp Trent users valid verify Victor voters votes weak keys XORed zeroknowledge zeroknowledge proof