Handbook of
Applied Cryptography

Brief Table of Contents

List of Tables
List of Figures
Foreword by R.L. Rivest

1. Overview of Cryptography
2. Mathematical Background
3. Number-Theoretic Reference Problems
4. Public-Key Parameters
5. Pseudorandom Bits and Sequences
6. Stream Ciphers
7. Block Ciphers
8. Public-Key Encryption
9. Hash Functions and Data Integrity
10. Identification and Entity Authentication
11. Digital Signatures
12. Key Establishment Protocols
13. Key Management Techniques
14. Efficient Implementation
15. Patents and Standards

Bibliography of Papers from Selected Cryptographic Forums

Return to the HAC home page