search for books and compare prices
Search >
cover image
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Click any price to visit the store and find more details or purchase the item. Pricing is shown for items sent to or within the United States via the least expensive method. Results are sorted by price, and shipping costs are not included. Permanent link:

Notes on prices

The price is the lowest for any condition, which may be new or used; other conditions may also be available.
Includes prices for new and used copies from resellers listed at Amazon (for that country).
Rental copies must be returned at the end of the designated period, and may involve a deposit.
Book cover for 9780471128458 Book cover for 9781119096726
20 anv edition from John Wiley & Sons Inc (March 30, 2015); titled "Applied Cryptography: Protocols, Algorithms and Source Code in C"
9781119096726 | details & prices | 758 pages | 10.00 × 12.00 × 2.00 in. | 3.00 lbs | List price $70.00
About: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography.
2 sub edition from John Wiley & Sons Inc (January 1, 1996)
9780471128458 | details & prices | 758 pages | 8.00 × 9.75 × 2.00 in. | 3.45 lbs | List price $60.00
About: ".
Book cover for 9780440120872 Book cover for 9780471117094 Book cover for 9780471597568
The price comparison is for this edition
2 revised edition from John Wiley & Sons Inc (November 1, 1995)
9780471117094 | details & prices | 758 pages | 7.50 × 9.25 × 1.50 in. | 2.95 lbs | List price $60.00
About: Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code.
With Friends of the Earth (other contributor) | from John Wiley & Sons Inc (January 1, 1994)
9780471597568 | details & prices | 7.50 × 9.25 × 1.25 in. | 2.40 lbs | List price $44.95
This edition also contains We Should All Be Ecofeminists: Friends of the Earth
About: Detailing how C and C++++ programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data, a guide shows how security can be built into software and systems used every day.
With Janet Louise Roberts | Reissue edition from Dell Pub Co (April 1, 1987); titled "The Cardross Luck"
9780440120872 | details & prices | List price $2.95
This edition also contains The Cardross Luck
About: In aristocratic Regency England, it was most uncommon for a young lady to propose marriage--but there was nothing common about beautiful, headstrong Heather Mallory.
2 edition from John Wiley & Sons Inc (February 11, 2011)
9781118081969 | details & prices | 784 pages | List price $60.00
Click to show details on same page as prices
Publisher John Wiley & Sons Inc
Publication date November 1, 1995
Pages 758
Binding Paperback
Edition 2 revised
Book category Adult Non-Fiction
ISBN-13 9780471117094
ISBN-10 0471117099
Dimensions 1.50 by 7.50 by 9.25 in.
Weight 2 lbs.
Original list price $60.00
Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code. Original. (Advanced). (view table of contents) description: Product Description: ". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Recency: These prices were retrieved a few seconds ago. The price comparison took about 5 seconds.

Shipping costs: The shipping cost shown by default, if you choose to display it, is the cheapest available for your destination.

Sales tax inclusion: If you set up an account with, live in the United States, and specify your state, you can choose to show shipping fees in price results. In this case, we include the sales tax whenever we can determine that such tax is charged by a store for delivery to your state.

Orders shipped across national borders or for countries other than the U.S.: Neither the sales price nor the shipping includes VAT, GST, customs, or other applicable taxes. Please consult the store to determine exact fees.

No warranties are made express or implied about the accuracy, timeliness, merit, or value of the information provided. Information subject to change without notice. is not a bookseller, just an information source.

Is information about the book missing or in error? Want to know more about where our bibliographic and pricing details come from? Report corrections and find out about's information sources here.