## CRC Press

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone

ISBN: 0-8493-8523-7

October 1996, 816 pages## Fifth Printing (August 2001)

The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.Chapter 1 - Overview of Cryptography

Chapter 2 - Mathematics Background

Chapter 3 - Number-Theoretic Reference Problems

Chapter 4 - Public-Key Parameters

Chapter 5 - Pseudorandom Bits and Sequences

Chapter 6 - Stream Ciphers

Chapter 7 - Block Ciphers

Chapter 8 - Public-Key Encryption

Chapter 9 - Hash Functions and Data Integrity

Chapter 10 - Identification and Entity Authentication

Chapter 11 - Digital Signatures

Chapter 12 - Key Establishment Protocols

Chapter 13 - Key Management Techniques

Chapter 14 - Efficient Implementation

Chapter 15 - Patents and Standards

Appendix - Bibliography of Papers from Selected Cryptographic Forums

References

Index

## About the book

- Book cover (gif file)
- Words from the authors
- Brief table of contents
- Table of contents
- Foreword, by Ron Rivest
- Preface
- Reviews
- How to order your own copy
- Errata (last updated April 21, 2002)
- Sample implementations (courtesy of Pate Williams)

Handbook of Applied Cryptography / ajmeneze at uwaterloo.ca / last updated November 19 2002