Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Bruce Schneier
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Work== ===Cryptographic algorithms === Schneier has been involved in the creation of many cryptographic algorithms. [[Hash functions]]: * [[Skein (hash function)|Skein]] [[Stream ciphers]]: * [[Solitaire (cipher)|Solitaire]] * [[Phelix]] * [[Phelix#Helix|Helix]] [[Pseudo-random number generator]]s: * [[Fortuna (PRNG)|Fortuna]] * [[Yarrow algorithm]] [[Block ciphers]]: * [[Blowfish (cipher)|Blowfish]] * [[Twofish]] * [[Threefish]] * [[MacGuffin (cipher)|MacGuffin]] === Publications === Schneier writes a freely available monthly Internet newsletter on computer and other security issues, ''Crypto-Gram'', as well as a security [[weblog]], ''Schneier on Security''.<ref>{{cite web| url = https://www.schneier.com/| title = schneier.com}}</ref> The blog focuses on the latest threats, and his own thoughts. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized.<ref name="blood">{{cite web |url= http://www.rebeccablood.net/bloggerson/bruceschneier.html |title= Bruce Schneier |access-date= April 19, 2007 |last= Blood |first= Rebecca |date= January 2007 |website= Bloggers on Blogging}}</ref>{{Citation needed|date=December 2008}} <!-- a blog does not count as an independent reliable third party source, especially when it's just an interview with the person in question making claims about himself… please see our reliable sources policy at [[WP:RS]] --> Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations ranging from [[biometrics]] to [[airline security]] after the [[September 11 attacks]].<ref>{{Cite journal|last=Severance|first=Charles|title=Bruce Schneier: the security mindset|journal=Computer|year=2016|volume=49|issue=2|pages=7–8|doi=10.1109/MC.2016.38}}</ref> * Schneier, Bruce. ''Applied Cryptography'', John Wiley & Sons, 1994. {{ISBN|0-471-59756-2}} * Schneier, Bruce. ''Protect Your Macintosh'', Peachpit Press, 1994. {{ISBN|1-56609-101-2}} * Schneier, Bruce. ''E-Mail Security'', John Wiley & Sons, 1995. {{ISBN|0-471-05318-X}} * Schneier, Bruce. ''Applied Cryptography'', Second Edition, John Wiley & Sons, 1996. {{ISBN|0-471-11709-9}} * Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. ''The [[Twofish]] Encryption Algorithm'', John Wiley & Sons, 1996. {{ISBN|0-471-35381-7}} * Schneier, Bruce; Banisar, David. ''The Electronic Privacy Papers'', John Wiley & Sons, 1997. {{ISBN|0-471-12297-1}} * Schneier, Bruce. ''Secrets and Lies: Digital Security in a Networked World'', John Wiley & Sons, 2000. {{ISBN|0-471-25311-1}} * Schneier, Bruce. ''[[Beyond Fear: Thinking Sensibly About Security in an Uncertain World]]'', Copernicus Books, 2003. {{ISBN|0-387-02620-7}} * Ferguson, Niels; Schneier, Bruce. ''[[Practical Cryptography]]'', John Wiley & Sons, 2003. {{ISBN|0-471-22357-3}} * Schneier, Bruce. ''Secrets and Lies: Digital Security in a Networked World'', John Wiley & Sons, 2004. {{ISBN|978-0-471-45380-2}} * Schneier, Bruce. ''Schneier on Security'', John Wiley & Sons, 2008. {{ISBN|978-0-470-39535-6}} * Ferguson, Niels; Schneier, Bruce; Kohno, Tadayoshi. ''Cryptography Engineering'', John Wiley & Sons, 2010. {{ISBN|978-0-470-47424-2}} * Schneier, Bruce. ''[[Liars and Outliers]]: Enabling the Trust that Society Needs to Thrive'', John Wiley & Sons, 2012. {{ISBN|978-1-118-14330-8}} * Schneier, Bruce. ''Carry On: Sound Advice from Schneier on Security'', John Wiley & Sons, 2013. {{ISBN|978-1118790816}} * Schneier, Bruce. ''Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World'', [[W. W. Norton & Company]], 2015. {{ISBN|978-0-393-24481-6}} * Schneier, Bruce. ''[[Click Here to Kill Everybody]]: Security and Survival in a Hyper-connected World'', [[W. W. Norton & Company]], 2018. {{ISBN|978-0-393-60888-5}} * Schneier, Bruce. ''We Have Root: Even More Advice from Schneier on Security'', John Wiley & Sons, 2019. {{ISBN|978-1119643012}} * Schneier, Bruce. ''A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back'', [[W. W. Norton & Company]], 2023. {{ISBN|978-0-393-86666-7}}
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Bruce Schneier
(section)
Add topic