1997-01-27 - Handbook of Applied Cryptography

Header Data

From: “Mullen, Patrick” <MullenP@ndhm06.ndhm.gtegsc.com>
To: “‘Cypherpunks’” <coderpunks@toad.com>
Message Hash: 5df00c438e3bd2ad6115dd8071c8123ada254915f59459b39a2d861d535cb038
Message ID: <c=US%a=%p=GTE%l=NDHM06-970127221028Z-78814@ndhm06.ndhm.gtegsc.com>
Reply To: _N/A

UTC Datetime: 1997-01-27 22:12:37 UTC
Raw Date: Mon, 27 Jan 1997 14:12:37 -0800 (PST)

Raw message

From: "Mullen, Patrick" <MullenP@ndhm06.ndhm.gtegsc.com>
Date: Mon, 27 Jan 1997 14:12:37 -0800 (PST)
To: "'Cypherpunks'" <coderpunks@toad.com>
Subject: Handbook of Applied Cryptography
Message-ID: <c=US%a=_%p=GTE%l=NDHM06-970127221028Z-78814@ndhm06.ndhm.gtegsc.com>
MIME-Version: 1.0
Content-Type: text/plain

(My apologies if someone else has posted this information and I missed

_Handbook_of_Applied_Cryptography_, Menezes, Oorschot, Vanstone, 
	CRC Press, Boca Raton, 1997

With a foreword by R.L. Rivest

Contents in Brief:
Table of Contents	v
List of Tables		xv
List of Figures		xix
Foreword		xxi
Preface			xxiii

1 Overview of Cryptography	1
2 Mathematical Background	49
3 Number-Theoretic Reverence
	Problems		87
4 Pulic-Key Parameters		133
5 Pseudorandom Bits and
	Sequences		169
6 Stream Ciphers		191
7 Block Ciphers			223
8 Public-Key Encryption		283
9 Hash Functions and Data
	Integrity			321
10 Identification and Entity
	Authentication		385
11 Digital Signatures		425
12 Key Establishment 
	Protocols		489
13 Key Management Techniques	543
14 Efficient Implementation	591
15 Patents and Standards	635
A Bibliography of Papers from
	Selected Cryptographic
	Forums			663

References			703
Index				775

>From the back cover:

Cryptography, in particular public-key cryptography, has emerged in the
las 20 years as an important discipline that is not only the subject of
enormous amount of research, but provides the foundation for information
security in many applications.  Standards are emerging to meet the
for cryptographic protection in most areas of data communications.
key cryptographic techniques are now in widespread use in industry, 
especially in the financial services industry, in the public sector, and
individuals for their personal privacy, such as in electronic mail.
Handbook will serve as a valuable reference for the novice as well as
the expert who needs a wider scope of coverage within the aread of
cryptography.  It is a necessary and timely guide for professionals who
practice the art of cryptography.

The _Handbook_of_Applied_Cryptography_ provides a treatment that 
is multifunctional:

* It serves as an introduction to the more practical aspects of
  both conventional and public-key cryptography

* It is a valuable source of the latest techniques and algorithms
  for the serious practitioner

* It provides an integrated treatment of the field, whil still
  presenting each major topic as a self-contained unit

* It provides a mathematical treatment to accompany 
  practical discussions

* It contains enough abstractoin to be a valuable reference for
  theoreticians while containing enough detail to actually allow
  implementation of the algorithms discussed

This is the definitive cryptography reference that novice as well as
developers, designers, researchers, engineers, computer scientists, and
mathematicials alike will find indispensable.

~ Patrick