000 01065 a2200145 4500
003 Nust
005 20170207154010.0
040 _cNust
100 _aAlfred J. Menezes Paul C. van Oorschot Scott A. Vanstone
245 _aHandbook Of Applied Cryptography (EBook)
_cAlfred J. Menezes Paul C. van Oorschot Scott A. Vanstone
260 _bRonald L. Rivest Webster Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology
_c1996
300 _axiii,780.p
505 _a Overview of Cryptography (Page-1) Mathematical Background (Page-49) Number-Theoretic Reference Problems (Page-87) Public-Key Parameters (Page-133) Pseudorandom Bits and Sequences (Page-169) Stream Ciphers (Page-191) Block Ciphers (Page-223) Public-Key Encryption (Page-283) Hash Functions and Data Integrity (Page-321) Identification and Entity Authentication (Page-385) Digital Signatures (Page-425) Key Establishment Protocols (Page-489) Key Management Techniques (Page-543) Efficient Implementation (Page-591) Patents and Standards (Page-635)
651 _aE-Book
942 _2ddc
_cBK
999 _c191162
_d191162