Skip to content
Scan a barcode
Scan
Added to your cart
Hardcover The Twofish Encryption Algorithm: A 128-Bit Block Cipher Book

ISBN: 0471353817

ISBN13: 9780471353812

The Twofish Encryption Algorithm: A 128-Bit Block Cipher

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Like New

$35.39
Save $29.61!
List Price $65.00
Almost Gone, Only 1 Left!

You Might Also Enjoy

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier

from: $4.79

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier

from: $4.69

Birdhouses: A Step-by-Step Guide to Building Attractive Homes for Your Feathered Friends
Birdhouses: A Step-by-Step Guide to Building Attractive Homes for Your Feathered Friends
John Kelsey

from: $6.09

Life As a Daymaker: How to Change the World by Simply Making Someone's Day
Life As a Daymaker: How to Change the World by Simply Making Someone's Day
David Wagner

from: $5.09

Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier

from: $5.19

Compilers : Principles, Techniques, and Tools
Compilers : Principles, Techniques, and Tools
Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Alfred V. Aho, Monica Lam, R. Sethi, Jeffrey D. Aho, Alfred V.; Sethi, Ravi; Ullman

from: $10.69

Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Stuart Russell, Peter Norvig

from: $20.29

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh

from: $4.89

Code Complete
Code Complete
Steve McConnell

from: $7.09

Mastering Regular Expressions
Mastering Regular Expressions
Jeffrey E.F. Friedl

from: $4.39

Practical Cryptography
Practical Cryptography
Niels Ferguson, Bruce Schneier

from: $6.39

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, Nick Sullivan, William L Simon, William L. Simon

from: $5.59

Discrete Mathematics and its Applications
Discrete Mathematics and its Applications
Kenneth H. Rosen

from: $5.79

Introduction to Algorithms
Introduction to Algorithms
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein

from: $14.09

Operating System Concepts
Operating System Concepts
Abraham Silberschatz, Greg Gagne, Peter B Galvin, Gerg Gagne, Peter B. Galvin, Peter Baer Galvin

from: $5.29

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll

from: $4.79

Learning the bash Shell
Learning the bash Shell
Cameron Newham, Bill Rosenblatt

from: $6.09

The C++ Programming Language
The C++ Programming Language
Bjarne Stroustrup

from: $5.09

The C Programming Language
The C Programming Language
Dennis M. Ritchie, Brian W. Kernighan

from: $10.29

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Bruce Schneier

from: $4.69

Computer Networking: A Top-Down Approach
Computer Networking: A Top-Down Approach
James F. Kurose, Keith Ross, Keith W. Ross

from: $4.79

Computer Networks
Computer Networks
Andrew S. Tanenbaum

from: $4.79

Computer Organization and Design: The Hardware/Software Interface
Computer Organization and Design: The Hardware/Software Interface
John L. Hennessy, David A. Patterson

from: $5.89

Beyond Fear
Beyond Fear
Bruce Schneier

from: $5.69

Book Overview

The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: * All aspects of Twofish's design and anatomy * Twofish performance and testing results * Step-by-step instructions on how to use it in your systems * Complete source code, in C, for implementing Twofish On the companion Web site you'll find: * A direct link to Counterpane Systems for updates on Twofish * A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium For updates on Twofish and the AES process, visit these sites: * www.wiley.com/compbooks/schneier * www.counterpane.com * www.nist.gov/aes Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier

Customer Reviews

3 customer ratings | 3 reviews

Rated 5 stars
fascinating to a limited audience

Bruce Schneier is the Yoda of crpytography and information security, if you've heard him there's no need to ask anyone else. This book would probably only appeal to the genuinely avid crypto fan, its Greek to anyone else. It is a thorough exposition of the making of the Twofish cypher, the latest attempt to secure information as absolutely as possible. You must be well versed in cryptography to get anything out of the work...

0Report

Rated 5 stars
A important book to decipher

This book is not a how-to-do thing. You will learn why this cypher was created, how it was created it all the details. Not an introductory book. But very worth to who ever want to enter modern applied cryptographic field.

0Report

Rated 4 stars
Official Discription by the people that developed it.

This is the official discription of the Twofish encryption algorithm by the people that developed it. The book gives the direct discription of what they have done, *PLUS* the reasons behind the choices that they made, and the considerations that were involved. The book has a readable style, and covers this algorithm in greater detail than I've ever seen one covered before. This book is a must for anyone planning to implement...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured