Bruce Schneier
Top View
- Key Separation in Twofish
- A Worldwide Survey of Encryption Products
- Improved Slide Attacks
- Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
- Cryptography Algorithms for Providing Security to Data While Transferring Over Network Jasmin Syed, J S Ananda Kumar
- Bruce Schneier
- The Self, the Stasi, the NSA: Privacy, Knowledge, and Complicity in the Surveillance State
- APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Table of Contents
- Secure Applications of Low-Entropy Keys
- Imes Discussion Paper Series
- A Cryptographic Evaluation of Ipsec
- Toward a Secure System Engineering Methodology*
- Data Encryption Standard
- Symmetric Algorithm Survey: a Comparative Analysis
- A Self-Study Course in Block-Cipher Cryptanalysis
- Testimony to the Government Administration and Elections Committee
- Lecture Notes in Computer Science 1978 Edited by G
- Twofish: a 128-Bit Block Cipher