TY - BOOK AU - Menezes,A.J. AU - Van Oorschot,Paul C. AU - Vanstone,Scott A. TI - Handbook of applied cryptography T2 - The CRC Press series on discrete mathematics and its applications SN - 0849385237 U1 - 005.82 PY - 1997/// CY - Boca Raton, Fla. PB - CRC Press KW - Computers KW - Access control KW - Handbooks, manuals, etc KW - Cryptography N1 - List of Tables. - List of Figures. - Foreword by R.L. Rivest. - Preface. - 1. Overview of Cryptography. - 2. Mathematical Background. - 3. Number-Theoretic Reference Problems. - 4. Public-Key Parameters. - 5. Pseudorandom Bits and Sequences. - 6. Stream Ciphers. - 7. Block Ciphers. - 8. Public-Key Encryption. - 9. Hash Functions and Data Integrity. - 10. Identification and Entity Authentication. - 11. Digital Signatures. - 12. Key Establishment Protocols. - 13. Key Management Techniques. - 14. Efficient Implementation. - 15. Patents and Standards. - A. Bibliography of Papers from Selected Cryptographic Forums. - References. - Index N2 - This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals. - Back cover ER -