Amazon cover image
Image from Amazon.com

Handbook of applied cryptography Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone.

By: Contributor(s): Material type: TextTextPublication details: Boca Raton : CRC Press, ©1997.Edition: Special Indian EditionDescription: xxviii, 780 pages : illustrations ; 26 cmISBN:
  • 9781138385979
DDC classification:
  • 005.82 MEN
Contents:
List of Tables -- List of Figures -- Foreword -- Preface -- 1. Overview of Cryptography -- 2. Mathematical Background -- 3. Number-Theoretic Reference Problems -- 4. Public-Key Parameters -- 5. Pseudorandom Bits and Sequences -- 6. Stream Ciphers -- 7. Block Ciphers -- 8. Public-Key Encryption -- 9. Hash Functions and Data Integrity -- 10. Identification and Entity Authentication -- 11. Digital Signatures -- 12. Key Establishment Protocols -- 13. Key Management Techniques -- 14. Efficient Implementation -- 15. Patents and Standards -- App. A. Bibliography of Papers from Selected Cryptographic Forums -- References -- Index.
Summary: Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography
List(s) this item appears in: New Arrivals April - June 2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books IIITDM Kurnool General Stacks 005.82 MEN (Browse shelf(Opens below)) Available 0004601
Books Books IIITDM Kurnool General Stacks 005.82 MEN (Browse shelf(Opens below)) Available 0004602

List of Tables --
List of Figures --
Foreword --
Preface --
1. Overview of Cryptography --
2. Mathematical Background --
3. Number-Theoretic Reference Problems --
4. Public-Key Parameters --
5. Pseudorandom Bits and Sequences --
6. Stream Ciphers --
7. Block Ciphers --
8. Public-Key Encryption --
9. Hash Functions and Data Integrity --
10. Identification and Entity Authentication --
11. Digital Signatures --
12. Key Establishment Protocols --
13. Key Management Techniques --
14. Efficient Implementation --
15. Patents and Standards --
App. A. Bibliography of Papers from Selected Cryptographic Forums --
References --
Index.

Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography

There are no comments on this title.

to post a comment.
LIBRARY HOURS
Mon - Sat : 9:00 AM - 5.30 PM
Library will remain closed on public holidays
Contact Us

Librarian
Central Libray
Indian Institute of Information Technology Design and Manufacturing Kurnool
Andhra Pradesh - 518 007

Library Email ID: library@iiitk.ac.in

Copyright @ Central Library | IIITDM Kurnool

Powered by Koha