Applied Cryptography: Protocols, Algorithms, and Source Code in C [ APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C BY Schneier, Bruce ( Author ) Nov-01-1995

Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code. Original. (Advanced).
Title: Applied Cryptography
Author: Schneier, Bruce
Publisher: John Wiley & Sons Inc
Publication Date: 1995/11/01
Number of Pages: 758
Binding Type: PAPERBACK
Library of Congress: 95012398

Reviews from

Write a review (you'll need to sign in to your Goodreads account or sign up) (showing 1-10 of 29)
By Koen (Tienen, Belgium) · ★★★★★ · December 07, 2013
Getting hold of a copy of Applied Cryptography took some effort (maybe the crypto export controls it makes such a big deal about have something to do with it, but incompetence is more likely to blame), but it's everything I expected it to be: a rock-solid book about cryptography as she is practis... ...more
By Jeff (Laguna Hills, CA) · ★★★★★ · November 11, 2012
This is a classic, foundational book in cryptography. It helped me along quite a bit early in my career.
By Gil (Ottawa, ON, Canada) · ★★★★☆ · July 17, 2014
If you need to write encryption applications, or, want to understand how encryption works, see the math, algorithms, source code so you can analyze in your favourite debugger, then this book is for you. Schneier is a master of Cryptography and doesn't disappoint.
However, be aware that a certain... ...more
By Maurizio (Milan, MI, Italy) · ★★★★★ · November 15, 2010
621 pagine di libro (listati esclusi, che tanto non è che vengano letti), ben densi. Non è certo una lettura di quelle da farsi prima di andare a dormire, a meno che non si soffra di insonnia forte e si cerchi qualcosa di veramente efficace.
Però il libro merita di essere letto da cima a fondo, e... ...more
By Nelson (San Francisco, CA) · ★★★★★ · April 10, 2014
What a wonderful book! I studied some crypto in college (public key and zero knowledge proofs) and found the field almost incomprehensible: lots of very specific number theories, very little overview information. Applied Cryptography fills this vital gap very successfully, going from completely i... ...more
By Zeeshan (New Delhi, 07, India) · ★★★★★ · April 11, 2013
This is the mother of all cryptographic books ever published, explaining each & every encryption algorithm EVER designed on this planet. Its an exhaustive list of algorithms, explaining each in detail, with their strengths and weaknesses, in a practical manner. The book is highly mathematical... ...more
By Kyle The Hacker · ★★★★☆ · May 27, 2013
While a classic, this book is beginning to show its age. It provides a solid overview of the fundamentals. However, it fails to cover many modern algorithms (such as Rjindael); this is, of course, no fault of the authors as these algorithms weren't published until after the book went to press.

Thi... ...more
By Colin (Mundelein, IL) · ★★★★☆ · January 27, 2013
Lots of detail on algorithms that are now out of date, but the opening chapters on crypto protocols were terrific. By far the largest bibliography I recall seeing - over 1500 entries. I'd recommend Practical Cryptography (or its later edition, Cryptography Engineering) above this one, even though... ...more
By Cameron (The United States) · ★★★★☆ · September 20, 2008
This is an excellent book on all the mainstream and not so mainstream encryption algorithms(as of several years ago). It does not include the new AES, or recent issues with md5, but Schneier has given some recommendations/predictions in this book that are in line with recent news.

I would have giv... ...more
By Rakesh (Jamshedpur, 38, India) · ★★★★☆ · November 24, 2012
I instantly had bought this one after I heard a lot from Internet sources about Bruce and his work. I have only skimmed through the book; looks good as an introductory text. Bruce Schneier is well known for his contributions in the field of cryptography and computer security; his ideas and writin... ...more