From: bs-org@c2.net
To: “Mullen, Patrick” <coderpunks@toad.com>
Message Hash: 0fd50de353b0dba5824b4a066fe164712569f61dfb90a250a7e103215df60038
Message ID: <1.5.4.16.19970128010431.25a74260@c2.net>
Reply To: N/A
UTC Datetime: 1997-01-28 01:05:02 UTC
Raw Date: Mon, 27 Jan 1997 17:05:02 -0800 (PST)
From: bs-org@c2.net
Date: Mon, 27 Jan 1997 17:05:02 -0800 (PST)
To: "Mullen, Patrick" <coderpunks@toad.com>
Subject: Re: Handbook of Applied Cryptography
Message-ID: <1.5.4.16.19970128010431.25a74260@c2.net>
MIME-Version: 1.0
Content-Type: text/plain
Can anybody inform me where to get this book in Europa or can anybody
buy it in USA and send it to me. I wil post the money immediately plus shipping
At 17:10 1997-01-27 -0500, Mullen, Patrick wrote:
>(My apologies if someone else has posted this information and I missed
>it.)
>
>_Handbook_of_Applied_Cryptography_, Menezes, Oorschot, Vanstone,
> CRC Press, Boca Raton, 1997
>
>With a foreword by R.L. Rivest
>
>Contents in Brief:
>Table of Contents v
>List of Tables xv
>List of Figures xix
>Foreword xxi
>Preface xxiii
>
>1 Overview of Cryptography 1
>2 Mathematical Background 49
>3 Number-Theoretic Reverence
> Problems 87
>4 Pulic-Key Parameters 133
>5 Pseudorandom Bits and
> Sequences 169
>6 Stream Ciphers 191
>7 Block Ciphers 223
>8 Public-Key Encryption 283
>9 Hash Functions and Data
> Integrity 321
>10 Identification and Entity
> Authentication 385
>11 Digital Signatures 425
>12 Key Establishment
> Protocols 489
>13 Key Management Techniques 543
>14 Efficient Implementation 591
>15 Patents and Standards 635
>A Bibliography of Papers from
> Selected Cryptographic
> Forums 663
>
>References 703
>Index 775
>
>>From the back cover:
>
><< BEGIN QUOTE >>
>Cryptography, in particular public-key cryptography, has emerged in the
>las 20 years as an important discipline that is not only the subject of
>an
>enormous amount of research, but provides the foundation for information
>security in many applications. Standards are emerging to meet the
>demands
>for cryptographic protection in most areas of data communications.
>Public-
>key cryptographic techniques are now in widespread use in industry,
>especially in the financial services industry, in the public sector, and
>by
>individuals for their personal privacy, such as in electronic mail.
>This
>Handbook will serve as a valuable reference for the novice as well as
>for
>the expert who needs a wider scope of coverage within the aread of
>cryptography. It is a necessary and timely guide for professionals who
>practice the art of cryptography.
>
>The _Handbook_of_Applied_Cryptography_ provides a treatment that
>is multifunctional:
>
>* It serves as an introduction to the more practical aspects of
> both conventional and public-key cryptography
>
>* It is a valuable source of the latest techniques and algorithms
> for the serious practitioner
>
>* It provides an integrated treatment of the field, whil still
> presenting each major topic as a self-contained unit
>
>* It provides a mathematical treatment to accompany
> practical discussions
>
>* It contains enough abstractoin to be a valuable reference for
> theoreticians while containing enough detail to actually allow
> implementation of the algorithms discussed
>
>This is the definitive cryptography reference that novice as well as
>experienced
>developers, designers, researchers, engineers, computer scientists, and
>mathematicials alike will find indispensable.
><< END QUOTE >>
>
>~~ Patrick
>
>
Return to January 1997
Return to “bs-org@c2.net”
1997-01-28 (Mon, 27 Jan 1997 17:05:02 -0800 (PST)) - Re: Handbook of Applied Cryptography - bs-org@c2.net