Handbook of applied cryptography
Cryptography, particularly public-key cryptography, has emerged in the last 20 years as a serious discipline. This handbook serves an introduction to the more practical aspects of both conventional and public-key cryptography.
Saved in:
| Main Authors: | Menezes, A. J. (Alfred J.) 1965- (Author), Van Oorschot, Paul C. (Author), Vanstone, Scott A. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
CRC Press
[1997]
|
| Series: | Discrete mathematics and its applications
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptography demystified
by: Hershey
Published: (2003)
by: Hershey
Published: (2003)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Computer science handbook
Published: (2004)
Published: (2004)
Control engineering handbook modeling, analysis & applications
by: Wilson, Gundel
Published: (2012)
by: Wilson, Gundel
Published: (2012)
Handbook of research on information security and assurance
Published: (2009)
Published: (2009)
Process/industrial instruments and controls handbook
Published: (1999)
Published: (1999)
Handbook of research on advanced hybrid intelligent techniques and applications
Published: (2016)
Published: (2016)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Handbook of research on end-to-end cloud computing architecture design
Published: (2017)
Published: (2017)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Instrument engineers' handbook process control and optimization : volume II
Published: (2006)
Published: (2006)
Handbook of material and capacity requirements planning
by: OdenlhHoward W.
by: OdenlhHoward W.
Quality management handbook
Published: (1997)
Published: (1997)
Industrial control handbook
by: ParrlhAndrew
by: ParrlhAndrew
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Project and cost engineer's handbooks
by: lh
by: lh
Juran's quality control handbooks
Published: (1988)
Published: (1988)
Handbook of space technology
Published: (2009)
Published: (2009)
Information Security Management Handbook
Published: (2012)
Published: (2012)
Handbook of simulator-based training
by: lh
by: lh
Active control of noise and vibration
by: Hansen, Colin H.
Published: (1997)
by: Hansen, Colin H.
Published: (1997)
Handbook of fractures
by: Egol, Kenneth A.
Published: (2010)
by: Egol, Kenneth A.
Published: (2010)
The HVAC handbook
by: lh
by: lh
Handbook of temperature measurement the theory and practice of thermoelectrics thermometry
Published: (1998)
Published: (1998)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Routledge handbook of applied sport psychology a comprehensive guide for students and practitioners
Published: (2010)
Published: (2010)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Handbook of simulation-Based training
by: Farmer
by: Farmer
Similar Items
-
Cryptography demystified
by: Hershey
Published: (2003) -
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004) -
Computer science handbook
Published: (2004) -
Control engineering handbook modeling, analysis & applications
by: Wilson, Gundel
Published: (2012) -
Handbook of research on information security and assurance
Published: (2009)


