1997-01-28 - Re: Handbook of Applied Cryptography

Header Data

From: bs-org@c2.net
To: “Mullen, Patrick” <coderpunks@toad.com>
Message Hash: 0fd50de353b0dba5824b4a066fe164712569f61dfb90a250a7e103215df60038
Message ID: <1.5.4.16.19970128010431.25a74260@c2.net>
Reply To: N/A
UTC Datetime: 1997-01-28 01:05:02 UTC
Raw Date: Mon, 27 Jan 1997 17:05:02 -0800 (PST)

Raw message

From: bs-org@c2.net
Date: Mon, 27 Jan 1997 17:05:02 -0800 (PST)
To: "Mullen, Patrick" <coderpunks@toad.com>
Subject: Re: Handbook of Applied Cryptography
Message-ID: <1.5.4.16.19970128010431.25a74260@c2.net>
MIME-Version: 1.0
Content-Type: text/plain


Can anybody inform me where to get this book in Europa or can anybody
buy it in USA and send it to me. I wil post the money immediately plus shipping



At 17:10 1997-01-27 -0500, Mullen, Patrick wrote:
>(My apologies if someone else has posted this information and I missed
>it.)
>
>_Handbook_of_Applied_Cryptography_, Menezes, Oorschot, Vanstone, 
>	CRC Press, Boca Raton, 1997
>
>With a foreword by R.L. Rivest
>
>Contents in Brief:
>Table of Contents	v
>List of Tables		xv
>List of Figures		xix
>Foreword		xxi
>Preface			xxiii
>
>1 Overview of Cryptography	1
>2 Mathematical Background	49
>3 Number-Theoretic Reverence
>	Problems		87
>4 Pulic-Key Parameters		133
>5 Pseudorandom Bits and
>	Sequences		169
>6 Stream Ciphers		191
>7 Block Ciphers			223
>8 Public-Key Encryption		283
>9 Hash Functions and Data
>	Integrity			321
>10 Identification and Entity
>	Authentication		385
>11 Digital Signatures		425
>12 Key Establishment 
>	Protocols		489
>13 Key Management Techniques	543
>14 Efficient Implementation	591
>15 Patents and Standards	635
>A Bibliography of Papers from
>	Selected Cryptographic
>	Forums			663
>
>References			703
>Index				775
>
>>From the back cover:
>
><< BEGIN QUOTE >>
>Cryptography, in particular public-key cryptography, has emerged in the
>las 20 years as an important discipline that is not only the subject of
>an
>enormous amount of research, but provides the foundation for information
>security in many applications.  Standards are emerging to meet the
>demands
>for cryptographic protection in most areas of data communications.
>Public-
>key cryptographic techniques are now in widespread use in industry, 
>especially in the financial services industry, in the public sector, and
>by
>individuals for their personal privacy, such as in electronic mail.
>This 
>Handbook will serve as a valuable reference for the novice as well as
>for
>the expert who needs a wider scope of coverage within the aread of
>cryptography.  It is a necessary and timely guide for professionals who
>practice the art of cryptography.
>
>The _Handbook_of_Applied_Cryptography_ provides a treatment that 
>is multifunctional:
>
>* It serves as an introduction to the more practical aspects of
>  both conventional and public-key cryptography
>
>* It is a valuable source of the latest techniques and algorithms
>  for the serious practitioner
>
>* It provides an integrated treatment of the field, whil still
>  presenting each major topic as a self-contained unit
>
>* It provides a mathematical treatment to accompany 
>  practical discussions
>
>* It contains enough abstractoin to be a valuable reference for
>  theoreticians while containing enough detail to actually allow
>  implementation of the algorithms discussed
>
>This is the definitive cryptography reference that novice as well as
>experienced
>developers, designers, researchers, engineers, computer scientists, and
>mathematicials alike will find indispensable.
><< END QUOTE >>
>
>~~ Patrick
>
>






Thread