Handbook of Applied CryptographyCryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use. |
Contents
1 | |
Mathematical Background | 49 |
NumberTheoretic Reference Problems | 87 |
PublicKey Parameters | 133 |
Pseudorandom Bits and Sequences | 169 |
Stream Ciphers | 191 |
Block Ciphers | 223 |
PublicKey Encryption | 283 |
Digital Signatures | 425 |
Key Establishment Protocols | 489 |
Key Management Techniques | 543 |
Efficient Implementation | 591 |
Patents and Standards | 635 |
Bibliography of Papers from Selected Cryptographic Forums | 663 |
References | 703 |
755 | |
Other editions - View all
Handbook of Applied Cryptography Alfred J. Menezes,Paul C. van Oorschot,Scott A. Vanstone Limited preview - 2018 |
Handbook of Applied Cryptography Alfred J. Menezes,Jonathan Katz,Paul C. van Oorschot,Scott A. Vanstone No preview available - 1996 |
Common terms and phrases
adversary Algorithm attack binary bitlength bits block cipher certificate ciphertext compression function compute cryptanalysis cryptographic Cryptology cryptosystem data integrity decryption defined Definition denotes Diffie-Hellman digital signature digital signature scheme discrete logarithm efficient ElGamal elliptic curve entity authentication Example exponent exponentiation Fact factor finite field hash functions identification input irreducible polynomial ISO/IEC iterated key agreement key establishment key management keystream LFSR linear complexity LNCS message authentication method modular multiplication modulo n-bit Note one-time one-way function operations output sequence pair parameters party password patent permutation plaintext polynomial positive integer preimage private key properties protocol pseudorandom public key public-key cryptography public-key encryption public-key encryption scheme quadratic random numbers rithm S-boxes secret key secret sharing Shamir specified standard stream ciphers subset subset sum problem symmetric symmetric-key Table techniques timestamp tion trusted values vector verify zero-knowledge