

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone†
NEW: Online courses
Sample Chapters FREE!!
CRC Press has generously given us permission to make all chapters available for free download.Please read this copyright notice before downloading any of the chapters.
- Table of Contents pdf
- Chapter 1 - Overview of Cryptography pdf
- Chapter 2 - Mathematics Background pdf
- Chapter 3 - Number-Theoretic Reference Problems pdf
- Chapter 4 - Public-Key Parameters pdf
- Chapter 5 - Pseudorandom Bits and Sequences pdf
- Chapter 6 - Stream Ciphers pdf
- Chapter 7 - Block Ciphers pdf
- Chapter 8 - Public-Key Encryption pdf
- Chapter 9 - Hash Functions and Data Integrity pdf
- Chapter 10 - Identification and Entity Authentication pdf
- Chapter 11 - Digital Signatures pdf
- Chapter 12 - Key Establishment Protocols pdf
- Chapter 13 - Key Management Techniques pdf
- Chapter 14 - Efficient Implementation pdf
- Chapter 15 - Patents and Standards pdf
- Appendix - Bibliography of Papers from Selected Cryptographic Forums pdf
- References pdf
- Index pdf
About the book
- Words from the authors
- Brief table of contents
- Table of contents
- Foreword, by Ron Rivest
- Preface
- Reviews
- Errata (last updated January 22, 2014)
Handbook of Applied Cryptography / ajmeneze at uwaterloo.ca / last updated July 8, 2011