From: “Mullen, Patrick” <MullenP@ndhm06.ndhm.gtegsc.com>
To: “‘Cypherpunks’” <coderpunks@toad.com>
Message Hash: 5df00c438e3bd2ad6115dd8071c8123ada254915f59459b39a2d861d535cb038
Message ID: <c=US%a=%p=GTE%l=NDHM06-970127221028Z-78814@ndhm06.ndhm.gtegsc.com>
Reply To: _N/A
UTC Datetime: 1997-01-27 22:12:37 UTC
Raw Date: Mon, 27 Jan 1997 14:12:37 -0800 (PST)
From: "Mullen, Patrick" <MullenP@ndhm06.ndhm.gtegsc.com>
Date: Mon, 27 Jan 1997 14:12:37 -0800 (PST)
To: "'Cypherpunks'" <coderpunks@toad.com>
Subject: Handbook of Applied Cryptography
Message-ID: <c=US%a=_%p=GTE%l=NDHM06-970127221028Z-78814@ndhm06.ndhm.gtegsc.com>
MIME-Version: 1.0
Content-Type: text/plain
(My apologies if someone else has posted this information and I missed
it.)
_Handbook_of_Applied_Cryptography_, Menezes, Oorschot, Vanstone,
CRC Press, Boca Raton, 1997
With a foreword by R.L. Rivest
Contents in Brief:
Table of Contents v
List of Tables xv
List of Figures xix
Foreword xxi
Preface xxiii
1 Overview of Cryptography 1
2 Mathematical Background 49
3 Number-Theoretic Reverence
Problems 87
4 Pulic-Key Parameters 133
5 Pseudorandom Bits and
Sequences 169
6 Stream Ciphers 191
7 Block Ciphers 223
8 Public-Key Encryption 283
9 Hash Functions and Data
Integrity 321
10 Identification and Entity
Authentication 385
11 Digital Signatures 425
12 Key Establishment
Protocols 489
13 Key Management Techniques 543
14 Efficient Implementation 591
15 Patents and Standards 635
A Bibliography of Papers from
Selected Cryptographic
Forums 663
References 703
Index 775
>From the back cover:
<< BEGIN QUOTE >>
Cryptography, in particular public-key cryptography, has emerged in the
las 20 years as an important discipline that is not only the subject of
an
enormous amount of research, but provides the foundation for information
security in many applications. Standards are emerging to meet the
demands
for cryptographic protection in most areas of data communications.
Public-
key cryptographic techniques are now in widespread use in industry,
especially in the financial services industry, in the public sector, and
by
individuals for their personal privacy, such as in electronic mail.
This
Handbook will serve as a valuable reference for the novice as well as
for
the expert who needs a wider scope of coverage within the aread of
cryptography. It is a necessary and timely guide for professionals who
practice the art of cryptography.
The _Handbook_of_Applied_Cryptography_ provides a treatment that
is multifunctional:
* It serves as an introduction to the more practical aspects of
both conventional and public-key cryptography
* It is a valuable source of the latest techniques and algorithms
for the serious practitioner
* It provides an integrated treatment of the field, whil still
presenting each major topic as a self-contained unit
* It provides a mathematical treatment to accompany
practical discussions
* It contains enough abstractoin to be a valuable reference for
theoreticians while containing enough detail to actually allow
implementation of the algorithms discussed
This is the definitive cryptography reference that novice as well as
experienced
developers, designers, researchers, engineers, computer scientists, and
mathematicials alike will find indispensable.
<< END QUOTE >>
~ Patrick
Return to January 1997
Return to ““Mullen, Patrick” <MullenP@ndhm06.ndhm.gtegsc.com>”
1997-01-27 (Mon, 27 Jan 1997 14:12:37 -0800 (PST)) - Handbook of Applied Cryptography - “Mullen, Patrick” <MullenP@ndhm06.ndhm.gtegsc.com>