Shop by category

    About

    Location: PortugalMember since: 30 August 2016

    All feedback (254)

    • digital-mart8- Feedback left by buyer.
      Past year
      Verified purchase
      Quick response and fast payment. Perfect! THANKS!!
    • yun996_9 (824)- Feedback left by buyer.
      Past year
      Verified purchase
      Quick response and fast payment. Perfect! THANKS!!
    • lsj2016 (7038)- Feedback left by buyer.
      Past year
      Verified purchase
      Thank you for an easy, pleasant transaction. Excellent buyer. A++++++.
    • anzik (157)- Feedback left by buyer.
      More than a year ago
      Verified purchase
      Danke, alles klar!
    • 18see4you (8398)- Feedback left by buyer.
      More than a year ago
      Verified purchase
      Good buyer,prompt payment,nice to deal with!
    • mileservices_com (5707)- Feedback left by buyer.
      More than a year ago
      Verified purchase
      HOPE TO DEAL WITH YOU AGAIN ** PERFECT EBAYER !!!!
    Reviews (1)
    Applied Cryptography: Protocols, Algorithms, and Source Code in C, Sec-ExLibrary
    09 February 2017
    Old, but still relevant.
    This book is directed at people who implement crypto. It's more for engineers than for academics. Most of us should know better than to make our own implementations of crypto algorithms. Today, it makes more sense to use tried-and-true libraries than to reinvent the wheel. I wouldn't use the book for its original purpose, but I still find it quite relevant to understand the basic concepts (and some history). It is highly dated. In 1996, the world was different. DES was still quite used, and the Clipper Chip was a current threat. Nobody talked about AES/Rijndael, and MD5 was already suspected to be insecure, though not yet as blatantly as today. This is not a good reference on how to do crypto in 2017. This is a good reference on what crypto is, what the basic concepts are about, and how they work. Buy this book if you are entering the world of crypto and want to have a holistic view of what it is about (symmetric/public-key cryptography; hashes; MACs; secret sharing, digital certificates, even digital cash.....). Do not buy this book if you need to learn current-day algorithms like AES or SHA-2 (SHA-1 is included, and considered secure back then). I found the book still worth my time and money. I'm now looking for similar, but updated books, and for the mathematical aspects of cryptography, I recommend Dan Boneh's (incredibly difficult) cryptography course in Coursera. All together, they are hard to beat. Do not focus all your energy on this book - but don't disregard it either.

    About

    Use this space to tell other eBay members about yourself and what you’re passionate about. Give people more reasons to follow you!1/1000