hn-classics/_stories/2001/6002694.md

5.7 KiB

created_at title url author points story_text comment_text num_comments story_id story_title story_url parent_id created_at_i _tags objectID year
2013-07-07T17:42:40.000Z Handbook of Applied Cryptography (2001) http://cacr.uwaterloo.ca/hac/ sirsar 77 19 1373218960
story
author_sirsar
story_6002694
6002694 2001

Source

Handbook of Applied Cryptography

book cover Handbook ofApplied Cryptography

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone

CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages

Fifth Printing (August 2001)

The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.

You can order the handbook today from any one of these online bookstores:


Sample Chapters FREE!!

CRC Press has generously given us permission to make all chapters available for free download.
Please read this copyright notice before downloading any of the chapters.

  • Table of Contents ps pdf
  • Chapter 1 - Overview of Cryptography ps pdf
  • Chapter 2 - Mathematics Background ps pdf
  • Chapter 3 - Number-Theoretic Reference Problems ps pdf
  • Chapter 4 - Public-Key Parameters ps pdf
  • Chapter 5 - Pseudorandom Bits and Sequences ps pdf
  • Chapter 6 - Stream Ciphers ps pdf
  • Chapter 7 - Block Ciphers ps pdf
  • Chapter 8 - Public-Key Encryption ps pdf
  • Chapter 9 - Hash Functions and Data Integrity ps pdf
  • Chapter 10 - Identification and Entity Authentication ps pdf
  • Chapter 11 - Digital Signatures ps pdf
  • Chapter 12 - Key Establishment Protocols ps pdf
  • Chapter 13 - Key Management Techniques ps pdf
  • Chapter 14 - Efficient Implementation ps pdf
  • Chapter 15 - Patents and Standards ps pdf
  • Appendix - Bibliography of Papers from Selected Cryptographic Forums ps pdf
  • References ps pdf
  • Index_ ps pdf

About the book


Handbook of Applied Cryptography / ajmeneze at uwaterloo.ca / last updated July 8, 2011