The Twofish Encryption Algorithm: A 128-Bit Block Cipher 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
* All aspects of Twofish's design and anatomy
* Twofish performance and testing results
* Step-by-step instructions on how to use it in your systems
* Complete source code, in C, for implementing Twofish
On the companion Web site you'll find:
* A direct link to Counterpane Systems for updates on Twofish
* A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium
For updates on Twofish and the AES process, visit these sites:
* www.wiley.com/compbooks/schneier
* www.counterpane.com
* www.nist.gov/aes
Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier
Popular titles by this author
Liars and Outliers: Enabling the Trust that Society Needs to ThriveHardcover$9.84 shippingOnly 3 left in stock (more on the way).
Secrets and Lies: Digital Security in a Networked WorldHardcover$9.98 shippingUsually ships within 2 to 3 weeks.
Editorial Reviews
From the Back Cover
* All aspects of Twofish's design and anatomy
* Twofish performance and testing results
* Step-by-step instructions on how to use it in your systems
* Complete source code, in C, for implementing Twofish
On the companion Web site you'll find:
* A direct link to Counterpane Systems for updates on Twofish
* A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium
For updates on Twofish and the AES process, visit these sites:
* www.wiley.com/compbooks/schneier
* www.counterpane.com
* www.nist.gov/aes
Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier
About the Author
Product details
- Publisher : Wiley; 1st edition (March 22, 1999)
- Language : English
- Hardcover : 208 pages
- ISBN-10 : 0471353817
- ISBN-13 : 978-0471353812
- Item Weight : 1.25 pounds
- Dimensions : 7.64 x 0.68 x 9.65 inches
- Best Sellers Rank: #4,066,221 in Books (See Top 100 in Books)
- #2,048 in Computer Networking (Books)
- #3,652 in Computer Networks, Protocols & APIs (Books)
- #17,357 in Computer Software (Books)
- Customer Reviews:
About the author

Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 12 books -- including "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" -- as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon


