Skip to content
Scan a barcode
Scan
Added to your cart
Paperback The Twofish Encryption Algorithm Book

ISBN: 0387987134

ISBN13: 9780387987132

The Twofish Encryption Algorithm

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Very Good*

*Best Available: (ex-library, missing dust jacket)

$96.79
Almost Gone, Only 1 Left!

You Might Also Enjoy

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier

from: $6.29

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier

from: $4.49

Birdhouses: A Step-by-Step Guide to Building Attractive Homes for Your Feathered Friends
Birdhouses: A Step-by-Step Guide to Building Attractive Homes for Your Feathered Friends
John Kelsey

from: $7.09

Life As a Daymaker: How to Change the World by Simply Making Someone's Day
Life As a Daymaker: How to Change the World by Simply Making Someone's Day
David Wagner

from: $4.39

Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier

from: $5.19

Compilers : Principles, Techniques, and Tools
Compilers : Principles, Techniques, and Tools
Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Alfred V. Aho, Monica Lam, R. Sethi, Jeffrey D. Aho, Alfred V.; Sethi, Ravi; Ullman

from: $10.39

Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Stuart Russell, Peter Norvig

from: $10.09

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh

from: $5.09

Code Complete
Code Complete
Steve McConnell

from: $6.99

Mastering Regular Expressions
Mastering Regular Expressions
Jeffrey E.F. Friedl

from: $4.79

Practical Cryptography
Practical Cryptography
Niels Ferguson, Bruce Schneier

from: $6.89

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, Nick Sullivan, William L Simon, William L. Simon

from: $5.59

Discrete Mathematics and its Applications
Discrete Mathematics and its Applications
Kenneth H. Rosen

from: $5.89

Introduction to Algorithms
Introduction to Algorithms
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein

from: $15.79

Operating System Concepts
Operating System Concepts
Abraham Silberschatz, Greg Gagne, Peter B Galvin, Gerg Gagne, Peter B. Galvin, Peter Baer Galvin

from: $5.29

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll

from: $4.69

Learning the bash Shell
Learning the bash Shell
Cameron Newham, Bill Rosenblatt

from: $5.29

The C++ Programming Language
The C++ Programming Language
Bjarne Stroustrup

from: $5.09

The C Programming Language
The C Programming Language
Dennis M. Ritchie, Brian W. Kernighan

from: $10.59

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Bruce Schneier

from: $5.49

Computer Networking: A Top-Down Approach
Computer Networking: A Top-Down Approach
James F. Kurose, Keith Ross, Keith W. Ross

from: $4.25

Computer Networks
Computer Networks
Andrew S. Tanenbaum

from: $4.42

The Protocols (TCP/IP Illustrated, Volume 1)
The Protocols (TCP/IP Illustrated, Volume 1)
W. Richard Stevens, Kevin R. Fall

from: $10.99

Computer Organization and Design: The Hardware/Software Interface
Computer Organization and Design: The Hardware/Software Interface
John L. Hennessy, David A. Patterson

from: $5.89

Book Overview

This text describes Twofish, an algorithm meeting the requirements put forth by the NIST (National Institute of Standards and Technology) for the Advanced Encryption Standard. It also describes the design goals for Twofish, and the building blocks and general design of the cipher.
More by Bruce Schneier
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier

from: $6.29

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier

from: $4.49

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
Bruce Schneier

from: $16.22

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Bruce Schneier

from: $5.49

Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier

from: $5.19

Practical Cryptography
Practical Cryptography
Niels Ferguson, Bruce Schneier

from: $6.89

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications
Tadayoshi Kohno, Bruce Schneier, Niels Ferguson

from: $12.99

Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier

from: $6.59

Beyond Fear
Beyond Fear
Bruce Schneier

from: $5.19

Schneier on Security
Schneier on Security
Bruce Schneier

from: $6.49

E-mail Security: How to Keep Your Electronic Messages Private
E-mail Security: How to Keep Your Electronic Messages Private
Bruce Schneier

from: $7.19

Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security
Bruce Schneier

from: $7.19

We Have Root: Even More Advice from Schneier on Security
We Have Root: Even More Advice from Schneier on Security
Bruce Schneier

from: $9.69

Protect Your Macintosh
Protect Your Macintosh
Bruce Schneier

from: $11.29

Economics of Information Security and Privacy III
Economics of Information Security and Privacy III
Bruce Schneier

from: $169.99

Rewiring the Republic: How AI Will Transform Our Politics, Government, and Citizenship (Strong Ideas)
Rewiring the Republic: How AI Will Transform Our Politics, Government, and Citizenship (Strong Ideas)
Bruce Schneier, Nathan Sanders

from: $23.50

The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance
The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance
Bruce Schneier, David Banisar

Out of Stock

Security Practitioner and Cryptography Handbook and Study Guide Set
Security Practitioner and Cryptography Handbook and Study Guide Set
Michael Gregg, Bruce Schneier

Out of Stock

Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography
Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography
Bruce Schneier

Out of Stock

Bruce Schneier on Trust Set
Bruce Schneier on Trust Set
Bruce Schneier

Out of Stock

Customer Reviews

0 customer rating | 0 review

Rated 5 stars
fascinating to a limited audience

Bruce Schneier is the Yoda of crpytography and information security, if you've heard him there's no need to ask anyone else. This book would probably only appeal to the genuinely avid crypto fan, its Greek to anyone else. It is a thorough exposition of the making of the Twofish cypher, the latest attempt to secure information as absolutely as possible. You must be well versed in cryptography to get anything out of the work...

0Report

Rated 5 stars
A important book to decipher

This book is not a how-to-do thing. You will learn why this cypher was created, how it was created it all the details. Not an introductory book. But very worth to who ever want to enter modern applied cryptographic field.

0Report

Rated 4 stars
Official Discription by the people that developed it.

This is the official discription of the Twofish encryption algorithm by the people that developed it. The book gives the direct discription of what they have done, *PLUS* the reasons behind the choices that they made, and the considerations that were involved. The book has a readable style, and covers this algorithm in greater detail than I've ever seen one covered before. This book is a must for anyone planning to implement...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured