Normal view MARC view ISBD view

Handbook of applied cryptography / Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.

By: Menezes, A. J. (Alfred J.), 1965-.
Contributor(s): Van Oorschot, Paul C | Vanstone, Scott A.
Series: The CRC Press series on discrete mathematics and its applications.Publisher: Boca Raton, Fla. : CRC Press, c1997Description: xxviii, 780 p. : ill. ; 26 cm.ISBN: 0849385237.Subject(s): Computers -- Access control -- Handbooks, manuals, etc | Cryptography -- Handbooks, manuals, etcDDC classification: 005.82
Contents:
List of Tables. - List of Figures. - Foreword by R.L. Rivest. - Preface. - 1. Overview of Cryptography. - 2. Mathematical Background. - 3. Number-Theoretic Reference Problems. - 4. Public-Key Parameters. - 5. Pseudorandom Bits and Sequences. - 6. Stream Ciphers. - 7. Block Ciphers. - 8. Public-Key Encryption. - 9. Hash Functions and Data Integrity. - 10. Identification and Entity Authentication. - 11. Digital Signatures. - 12. Key Establishment Protocols. - 13. Key Management Techniques. - 14. Efficient Implementation. - 15. Patents and Standards. - A. Bibliography of Papers from Selected Cryptographic Forums. - References. - Index.
Summary: This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals. - Back cover.
Item type Current location Call number Copy number Status Notes Date due Barcode Remark
Main Collection TU External Storage-LCS
005.82 MEN (Browse shelf) 1 Available SOCIT, SOCIT, 560460 1000109399 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

List of Tables. - List of Figures. - Foreword by R.L. Rivest. - Preface. - 1. Overview of Cryptography. - 2. Mathematical Background. - 3. Number-Theoretic Reference Problems. - 4. Public-Key Parameters. - 5. Pseudorandom Bits and Sequences. - 6. Stream Ciphers. - 7. Block Ciphers. - 8. Public-Key Encryption. - 9. Hash Functions and Data Integrity. - 10. Identification and Entity Authentication. - 11. Digital Signatures. - 12. Key Establishment Protocols. - 13. Key Management Techniques. - 14. Efficient Implementation. - 15. Patents and Standards. - A. Bibliography of Papers from Selected Cryptographic Forums. - References. - Index.

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals. - Back cover.