TY - BOOK AU - : Menezes, A. J AU - Van Oorschot, Paul C AU - Vanstone, Scott A. TI - Handbook of applied cryptography SN - 9781138385979 U1 - 005.82 PY - 1997/// CY - Boca Raton PB - CRC Press, N1 - List of Tables -- ; List of Figures -- ; Foreword -- ; Preface -- ; 1. Overview of Cryptography -- ; 2. Mathematical Background -- ; 3. Number-Theoretic Reference Problems -- ; 4. Public-Key Parameters -- ; 5. Pseudorandom Bits and Sequences -- ; 6. Stream Ciphers -- ; 7. Block Ciphers -- ; 8. Public-Key Encryption -- ; 9. Hash Functions and Data Integrity -- ; 10. Identification and Entity Authentication -- ; 11. Digital Signatures -- ; 12. Key Establishment Protocols -- ; 13. Key Management Techniques -- ; 14. Efficient Implementation -- ; 15. Patents and Standards -- ; App. A. Bibliography of Papers from Selected Cryptographic Forums -- ; References -- ; Index N2 - Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography ER -