Handbook of Applied Cryptography

@inproceedings{Menezes1996HandbookOA,
  title={Handbook of Applied Cryptography},
  author={A. Menezes and P. V. Oorschot and S. Vanstone},
  year={1996}
}
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper. 

Figures, Tables, and Topics from this paper

METHODS OF CRYPTOGRAPHY
Investigating Modern Cryptography
Arithmetic for Public-Key Cryptography
Public-Key Cryptography: An Overview of some Algorithms
Modular-Arithmetic Cryptosystems
Review paper on cryptography
Cryptography and Security Systems
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 842 REFERENCES
Primality and cryptography
  • E. Kranakis
  • Mathematics, Computer Science
  • Wiley-Teubner series in computer science
  • 1986
Some Regular Properties of the 'Data Encryption Standard' Algorithm
Standardization of Cryptographic Techniques
  • B. Preneel
  • Computer Science
  • Computer Security and Industrial Cryptography
  • 1991
Use of Elliptic Curves in Cryptography
  • V. Miller
  • Mathematics, Computer Science
  • CRYPTO
  • 1985
A computer package for measuring the strength of encryption algorithms
Public-Key Cryptography
  • A. Salomaa
  • Computer Science
  • EATCS Monographs on Theoretical Computer Science
  • 1990
Multiuser cryptographic techniques
An extension of the Shannon theory approach to cryptography
  • M. Hellman
  • Computer Science
  • IEEE Trans. Inf. Theory
  • 1977
Visual Cryptography
On the Security of Compressed Encodings
  • S. Akl
  • Computer Science
  • CRYPTO
  • 1983
...
1
2
3
4
5
...