Amazon cover image
Image from Amazon.com
Image from Google Jackets

Handbook of applied cryptography

By: Material type: TextTextLanguage: English Series: Discrete Mathematics and its Applications | ; Van Oorschot, Paul CPublication details: New York CRC Press 1977Description: xxviii, 780p. illISBN:
  • 0849385237 (HB)
Subject(s):
Contents:
1. Overview of Cryptography 2. Mathematical Background 3. Number-Theoretic Reference Problems 4. Public-Key Parameters 5. Pseudorandom Bits and Sequences 6. Stream Ciphers 7. Block Ciphers 8. Public-Key Encryption 9. Hash Functions and Data Integrity 10. Identification and Entity Authentication 11. Digital Signatures 12. Key Establishment Protocols 13. Key Management Techniques 14. Efficient Implementation 15. Patents and Standards
Summary: Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography.
Item type: BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified Status Date due Barcode
IMSc Library 51:681.18 MEN (Browse shelf(Opens below)) Available 41709

Includes index

Includes bibliography (p. 703-754) and references

1. Overview of Cryptography 2. Mathematical Background 3. Number-Theoretic Reference Problems 4. Public-Key Parameters 5. Pseudorandom Bits and Sequences 6. Stream Ciphers 7. Block Ciphers 8. Public-Key Encryption 9. Hash Functions and Data Integrity 10. Identification and Entity Authentication 11. Digital Signatures 12. Key Establishment Protocols 13. Key Management Techniques 14. Efficient Implementation 15. Patents and Standards

Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India