Handbook of applied cryptography

Cryptography, particularly public-key cryptography, has emerged in the last 20 years as a serious discipline. This handbook serves an introduction to the more practical aspects of both conventional and public-key cryptography.

Saved in:
Bibliographic Details
Main Authors: Menezes, A. J. (Alfred J.) 1965- (Author), Van Oorschot, Paul C. (Author), Vanstone, Scott A. (Author)
Format: Book
Language:English
Published: Boca Raton CRC Press [1997]
Series:Discrete mathematics and its applications
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 54712
003 MY-KLNDU
005 20241219014819.0
008 221104s1997 flua b 001 0 eng d
020 |a 0849385237 
039 9 |a 202211041238  |b VLOAD  |c 202008130922  |d azraai  |c 202008130920  |d azraai  |y 202008130919  |z azraai 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9.A25 M463 1997 
100 1 |a Menezes, A. J.  |q (Alfred J.)  |d 1965-  |e author 
245 1 0 |a Handbook of applied cryptography  |c Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone 
246 3 0 |a Applied cryptography 
264 1 |a Boca Raton  |b CRC Press  |c [1997] 
264 4 |c ©1997 
300 |a 780 pages  |b illustrations  |c 26 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 |a CRC Press series on discrete mathematics and its applications 
504 |a Includes bibliographical references and index 
505 0 |a Overview of cryptography -- Mathematical background -- Number-theoretic reference problems -- Public-key parameters -- Pseudorandom bits and sequences -- Stream ciphers -- Block ciphers -- Public-key encryption -- Hash functions and data integrity -- Identification and entity authentication -- Digital signatures -- Key extablishment protocols -- Key management techniques -- Efficient implementation -- Patents and standards 
520 |a Cryptography, particularly public-key cryptography, has emerged in the last 20 years as a serious discipline. This handbook serves an introduction to the more practical aspects of both conventional and public-key cryptography. 
592 |a 1052  |b 26/11/19  |c RM230.04  |h Amwood 
650 0 |a Computers  |x Access control  |v Handbooks, manuals, etc 
650 0 |a Cryptography  |v Handbooks, manuals, etc 
700 1 |a Van Oorschot, Paul C.  |e author 
700 1 |a Vanstone, Scott A.  |e author 
830 0 |a Discrete mathematics and its applications 
999 |a vtls000066422  |c 54712  |d 54712