![]()
![]()
CRC Press
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
ISBN: 0-8493-8523-7
October 1996, 816 pagesFifth Printing (August 2001)
The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.Chapter 1 - Overview of Cryptography
Chapter 2 - Mathematics Background
Chapter 3 - Number-Theoretic Reference Problems
Chapter 4 - Public-Key Parameters
Chapter 5 - Pseudorandom Bits and Sequences
Chapter 6 - Stream Ciphers
Chapter 7 - Block Ciphers
Chapter 8 - Public-Key Encryption
Chapter 9 - Hash Functions and Data Integrity
Chapter 10 - Identification and Entity Authentication
Chapter 11 - Digital Signatures
Chapter 12 - Key Establishment Protocols
Chapter 13 - Key Management Techniques
Chapter 14 - Efficient Implementation
Chapter 15 - Patents and Standards
Appendix - Bibliography of Papers from Selected Cryptographic Forums
References
Index
About the book
- Book cover (gif file)
- Words from the authors
- Brief table of contents
- Table of contents
- Foreword, by Ron Rivest
- Preface
- Reviews
- How to order your own copy
- Errata (last updated April 21, 2002)
- Sample implementations (courtesy of Pate Williams)
Handbook of Applied Cryptography / ajmeneze at uwaterloo.ca / last updated November 19 2002