hn-classics/_stories/2001/11662441.md

144 lines
5.7 KiB
Markdown

---
created_at: '2016-05-09T19:27:29.000Z'
title: Handbook of Applied Cryptography (2001)
url: http://cacr.uwaterloo.ca/hac/
author: rfreytag
points: 114
story_text:
comment_text:
num_comments: 17
story_id:
story_title:
story_url:
parent_id:
created_at_i: 1462822049
_tags:
- story
- author_rfreytag
- story_11662441
objectID: '11662441'
year: 2001
---
[Source](http://cacr.uwaterloo.ca/hac/ "Permalink to Handbook of Applied Cryptography ")
# Handbook of Applied Cryptography
> ![book cover][1] ![Handbook of
Applied Cryptography][2]
>
> #### [Alfred J. Menezes][3], [Paul C. van Oorschot][4] and [Scott A. Vanstone][5]
>
> CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages
>
> ### Fifth Printing (August 2001)
>
> The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.
You can order the handbook today from any one of these online bookstores:
>
> * [Amazon Books (amazon.com)][6] (Price as of May 9, 2016: US $**84.10**).
> * [Amazon.ca][7] (for Canadian orders) (Price as of May 9, 2016: Cdn $**118.22**).
> * [CRC Press][8] (Price as of May 9, 2016: US $**97.95**).
>
> * * *
>
> ### Sample Chapters FREE!!
>
> CRC Press has generously given us permission to make all chapters available for free download.
**Please read this [copyright notice][9] before downloading any of the chapters**.
>
> * Table of Contents [ps][10] [pdf][11]
> * Chapter 1 - _Overview of Cryptography_ [ps][12] [pdf][13]
> * Chapter 2 - _Mathematics Background_ [ps][14] [pdf][15]
> * Chapter 3 - _Number-Theoretic Reference Problems_ [ps][16] [pdf][17]
> * Chapter 4 - _Public-Key Parameters_ [ps][18] [pdf][19]
> * Chapter 5 - _Pseudorandom Bits and Sequences_ [ps][20] [pdf][21]
> * Chapter 6 - _Stream Ciphers_ [ps][22] [pdf][23]
> * Chapter 7 - _Block Ciphers_ [ps][24] [pdf][25]
> * Chapter 8 - _Public-Key Encryption_ [ps][26] [pdf][27]
> * Chapter 9 - _Hash Functions and Data Integrity_ [ps][28] [pdf][29]
> * Chapter 10 - _Identification and Entity Authentication_ [ps][30] [pdf][31]
> * Chapter 11 - _Digital Signatures_ [ps][32] [pdf][33]
> * Chapter 12 - _Key Establishment Protocols_ [ps][34] [pdf][35]
> * Chapter 13 - _Key Management Techniques_ [ps][36] [pdf][37]
> * Chapter 14 - _Efficient Implementation_ [ps][38] [pdf][39]
> * Chapter 15 - _Patents and Standards_ [ps][40] [pdf][41]
> * Appendix - _Bibliography of Papers from Selected Cryptographic Forums_ [ps][42] [pdf][43]
> * References [ps][44] [pdf][45]
> * Index_ [ps][46] [pdf][47]
>
> * * *
>
> ### About the book
>
> * [Words from the authors][48]
> * [ Brief table of contents][49]
> * [ Table of contents][50]
> * [ Foreword, by Ron Rivest][51]
> * [ Preface][52]
> * [ Reviews][53]
> * [ Errata][54] (last updated January 22, 2014)
>
> * * *
>
> Handbook of Applied Cryptography / ajmeneze at uwaterloo.ca / last updated July 8, 2011
[1]: http://cacr.uwaterloo.ca/gifs/book.gif
[2]: http://cacr.uwaterloo.ca/gifs/hac_banner_anima.gif
[3]: http://cacr.uwaterloo.ca/authors/ajm.html
[4]: http://cacr.uwaterloo.ca/authors/pvo.html
[5]: http://cacr.uwaterloo.ca/authors/sav.html
[6]: http://www.amazon.com/exec/obidos/ISBN=0849385237/7181-7381933-595174
[7]: http://www.amazon.ca/exec/obidos/ASIN/0849385237/qid=1142248212/sr=8-1/ref=sr_8_xs_ap_i1_xgl/702-6103960-4704013
[8]: https://www.crcpress.com/Handbook-of-Applied-Cryptography/Menezes-Oorschot-Vanstone/9780849385230
[9]: http://cacr.uwaterloo.ca/about/copyright-notice.html
[10]: http://cacr.uwaterloo.ca/about/toc3.ps
[11]: http://cacr.uwaterloo.ca/about/toc3.pdf
[12]: http://cacr.uwaterloo.ca/about/chap1.ps
[13]: http://cacr.uwaterloo.ca/about/chap1.pdf
[14]: http://cacr.uwaterloo.ca/about/chap2.ps
[15]: http://cacr.uwaterloo.ca/about/chap2.pdf
[16]: http://cacr.uwaterloo.ca/about/chap3.ps
[17]: http://cacr.uwaterloo.ca/about/chap3.pdf
[18]: http://cacr.uwaterloo.ca/about/chap4.ps
[19]: http://cacr.uwaterloo.ca/about/chap4.pdf
[20]: http://cacr.uwaterloo.ca/about/chap5.ps
[21]: http://cacr.uwaterloo.ca/about/chap5.pdf
[22]: http://cacr.uwaterloo.ca/about/chap6.ps
[23]: http://cacr.uwaterloo.ca/about/chap6.pdf
[24]: http://cacr.uwaterloo.ca/about/chap7.ps
[25]: http://cacr.uwaterloo.ca/about/chap7.pdf
[26]: http://cacr.uwaterloo.ca/about/chap8.ps
[27]: http://cacr.uwaterloo.ca/about/chap8.pdf
[28]: http://cacr.uwaterloo.ca/about/chap9.ps
[29]: http://cacr.uwaterloo.ca/about/chap9.pdf
[30]: http://cacr.uwaterloo.ca/about/chap10.ps
[31]: http://cacr.uwaterloo.ca/about/chap10.pdf
[32]: http://cacr.uwaterloo.ca/about/chap11.ps
[33]: http://cacr.uwaterloo.ca/about/chap11.pdf
[34]: http://cacr.uwaterloo.ca/about/chap12.ps
[35]: http://cacr.uwaterloo.ca/about/chap12.pdf
[36]: http://cacr.uwaterloo.ca/about/chap13.ps
[37]: http://cacr.uwaterloo.ca/about/chap13.pdf
[38]: http://cacr.uwaterloo.ca/about/chap14.ps
[39]: http://cacr.uwaterloo.ca/about/chap14.pdf
[40]: http://cacr.uwaterloo.ca/about/chap15.ps
[41]: http://cacr.uwaterloo.ca/about/chap15.pdf
[42]: http://cacr.uwaterloo.ca/about/appendix.ps
[43]: http://cacr.uwaterloo.ca/about/appendix.pdf
[44]: http://cacr.uwaterloo.ca/about/references.ps
[45]: http://cacr.uwaterloo.ca/about/references.pdf
[46]: http://cacr.uwaterloo.ca/about/index.ps
[47]: http://cacr.uwaterloo.ca/about/index.pdf
[48]: http://cacr.uwaterloo.ca/about/words.html
[49]: http://cacr.uwaterloo.ca/about/brief_contents.html
[50]: http://cacr.uwaterloo.ca/about/table_of_contents.html
[51]: http://cacr.uwaterloo.ca/about/foreword.html
[52]: http://cacr.uwaterloo.ca/about/preface.html
[53]: http://cacr.uwaterloo.ca/about/reviews/reviews.html
[54]: http://cacr.uwaterloo.ca/errata/errata.html