Quantcast
Viewing all articles
Browse latest Browse all 20530

handbook of applied cryptography(应用加密学手册)

CRC Press has generously given us permission to make all chapters available for free download.
Please read this copyright notice before downloading any of the chapters.
  • Table of Contents pspdf
  • Chapter 1 - Overview of Cryptographypspdf
  • Chapter 2 - Mathematics Backgroundpspdf
  • Chapter 3 - Number-Theoretic Reference Problemspspdf
  • Chapter 4 - Public-Key Parameterspspdf
  • Chapter 5 - Pseudorandom Bits and Sequencespspdf
  • Chapter 6 - Stream Cipherspspdf
  • Chapter 7 - Block Cipherspspdf
  • Chapter 8 - Public-Key Encryptionpspdf
  • Chapter 9 - Hash Functions and Data Integritypspdf
  • Chapter 10 - Identification and Entity Authenticationpspdf
  • Chapter 11 - Digital Signaturespspdf
  • Chapter 12 - Key Establishment Protocolspspdf
  • Chapter 13 - Key Management Techniquespspdf
  • Chapter 14 - Efficient Implementationpspdf
  • Chapter 15 - Patents and Standardspspdf
  • Appendix - Bibliography of Papers from Selected Cryptographic Forumspspdf
  • References pspdf
  • Index pspdf

About the book

from http://cacr.uwaterloo.ca/hac/

Viewing all articles
Browse latest Browse all 20530


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>