000 01658nam a22002057a 4500
999 _c1526
_d1526
005 20220405110108.0
008 220405b ||||| |||| 00| 0 eng d
020 _a9781138385979
082 _a005.82
_bMEN
100 _a: Menezes, A. J
245 _aHandbook of applied cryptography
_cAlfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.
250 _aSpecial Indian Edition
260 _aBoca Raton :
_b CRC Press,
_c©1997.
300 _axxviii, 780 pages :
_b illustrations ;
_c26 cm
505 _tList of Tables --
_tList of Figures --
_tForeword --
_tPreface --
_t1. Overview of Cryptography --
_t2. Mathematical Background --
_t3. Number-Theoretic Reference Problems --
_t4. Public-Key Parameters --
_t5. Pseudorandom Bits and Sequences --
_t6. Stream Ciphers --
_t7. Block Ciphers --
_t8. Public-Key Encryption --
_t9. Hash Functions and Data Integrity --
_t10. Identification and Entity Authentication --
_t11. Digital Signatures --
_t12. Key Establishment Protocols --
_t13. Key Management Techniques --
_t14. Efficient Implementation --
_t15. Patents and Standards --
_tApp. A. Bibliography of Papers from Selected Cryptographic Forums --
_tReferences --
_tIndex.
520 _aCryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography
700 _a Van Oorschot, Paul C
700 _aVanstone, Scott A.
942 _2ddc
_cBK