Sunday, August 26, 2007
Handbook of Applied Cryptography Chapter 1 - Overview of Cryptography (48 pages) Chapter 2 - Mathematics Background (38 pages) Chapter 3 - Number-Theoretic Reference Problems (46 pages) Chapter 4 - Public-Key Parameters (36 pages) Chapter 5 - Pseudorandom Bits and Sequences (22 pages) Chapter 6 - Stream Ciphers (32 pages) Chapter 7 - Block Ciphers (60 pages) Chapter 8 - Public-Key Encryption (36 pages) Chapter 9 - Hash Functions and Data Integrity (61 pages) Chapter 10 - Identification and Entity Authentication (40 pages) Chapter 11 - Digital Signatures (64 pages) Chapter 12 - Key Establishment Protocols (53 pages) Chapter 13 - Key Management Techniques (48 pages) Chapter 14 - Efficient Implementation (44 pages) Chapter 15 - Patents and Standards (27 pages) Appendix - Bibliography of Papers from Selected Cryptographic Forums (40 pages) Index (26 pages) hxxp://www.wntrmute.com/docs/cryptography/ Labels: Computer Engineering, Networking Ebooks |