CRC Press has generously given us permission to make all chapters available for free download.
Please read this copyright notice before downloading any of the chapters.
Please read this copyright notice before downloading any of the chapters.
- Table of Contents pspdf
- Chapter 1 - Overview of Cryptographypspdf
- Chapter 2 - Mathematics Backgroundpspdf
- Chapter 3 - Number-Theoretic Reference Problemspspdf
- Chapter 4 - Public-Key Parameterspspdf
- Chapter 5 - Pseudorandom Bits and Sequencespspdf
- Chapter 6 - Stream Cipherspspdf
- Chapter 7 - Block Cipherspspdf
- Chapter 8 - Public-Key Encryptionpspdf
- Chapter 9 - Hash Functions and Data Integritypspdf
- Chapter 10 - Identification and Entity Authenticationpspdf
- Chapter 11 - Digital Signaturespspdf
- Chapter 12 - Key Establishment Protocolspspdf
- Chapter 13 - Key Management Techniquespspdf
- Chapter 14 - Efficient Implementationpspdf
- Chapter 15 - Patents and Standardspspdf
- Appendix - Bibliography of Papers from Selected Cryptographic Forumspspdf
- References pspdf
- Index pspdf