Sold Out
Book Categories |
List of Tables | ||
List of Figures | ||
Foreword | ||
Preface | ||
1 | Overview of Cryptography | 1 |
2 | Mathematical Background | 49 |
3 | Number-Theoretic Reference Problems | 87 |
4 | Public-Key Parameters | 133 |
5 | Pseudorandom Bits and Sequences | 169 |
6 | Stream Ciphers | 191 |
7 | Block Ciphers | 223 |
8 | Public-Key Encryption | 283 |
9 | Hash Functions and Data Integrity | 321 |
10 | Identification and Entity Authentication | 385 |
11 | Digital Signatures | 425 |
12 | Key Establishment Protocols | 489 |
13 | Key Management Techniques | 543 |
14 | Efficient Implementation | 591 |
15 | Patents and Standards | 635 |
App. A | Bibliography of Papers from Selected Cryptographic Forums | 663 |
References | 703 | |
Index | 755 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionHandbook of Applied Cryptography
X
This Item is in Your InventoryHandbook of Applied Cryptography
X
You must be logged in to review the productsX
X
X
Add Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography to the inventory that you are selling on WonderClubX
X
Add Handbook of Applied Cryptography, Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Sta, Handbook of Applied Cryptography to your collection on WonderClub |