Quantcast
Channel: 看得透又看得远者prevail. ppt.cc/flUmLx ppt.cc/fqtgqx ppt.cc/fZsXUx ppt.cc/fhWnZx ppt.cc/fnrkVx ppt.cc/f2CBVx
Viewing all articles
Browse latest Browse all 20523

handbook of applied cryptography(应用加密学手册)

$
0
0
CRC Press has generously given us permission to make all chapters available for free download.
Please read this copyright notice before downloading any of the chapters.
  • Table of Contents pspdf
  • Chapter 1 - Overview of Cryptographypspdf
  • Chapter 2 - Mathematics Backgroundpspdf
  • Chapter 3 - Number-Theoretic Reference Problemspspdf
  • Chapter 4 - Public-Key Parameterspspdf
  • Chapter 5 - Pseudorandom Bits and Sequencespspdf
  • Chapter 6 - Stream Cipherspspdf
  • Chapter 7 - Block Cipherspspdf
  • Chapter 8 - Public-Key Encryptionpspdf
  • Chapter 9 - Hash Functions and Data Integritypspdf
  • Chapter 10 - Identification and Entity Authenticationpspdf
  • Chapter 11 - Digital Signaturespspdf
  • Chapter 12 - Key Establishment Protocolspspdf
  • Chapter 13 - Key Management Techniquespspdf
  • Chapter 14 - Efficient Implementationpspdf
  • Chapter 15 - Patents and Standardspspdf
  • Appendix - Bibliography of Papers from Selected Cryptographic Forumspspdf
  • References pspdf
  • Index pspdf

About the book

from http://cacr.uwaterloo.ca/hac/

Viewing all articles
Browse latest Browse all 20523

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>