Wonder Club world wonders pyramid logo
×

Handbook of Applied Cryptography Book

Handbook of Applied Cryptography
Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography has a rating of 4 stars
   2 Ratings
X
Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography
4 out of 5 stars based on 2 reviews
5
0 %
4
100 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Handbook of Applied Cryptography
  • Written by author Alfred J. Menezes
  • Published by CRC Press, October 1996
  • Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta
  • Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

List of Tables
List of Figures
Foreword
Preface
1Overview of Cryptography1
2Mathematical Background49
3Number-Theoretic Reference Problems87
4Public-Key Parameters133
5Pseudorandom Bits and Sequences169
6Stream Ciphers191
7Block Ciphers223
8Public-Key Encryption283
9Hash Functions and Data Integrity321
10Identification and Entity Authentication385
11Digital Signatures425
12Key Establishment Protocols489
13Key Management Techniques543
14Efficient Implementation591
15Patents and Standards635
App. ABibliography of Papers from Selected Cryptographic Forums663
References703
Index755


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography

X
WonderClub Home

This item is in your Collection

Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography

Handbook of Applied Cryptography

X
WonderClub Home

This Item is in Your Inventory

Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography

Handbook of Applied Cryptography

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: