Brief Table of Contents
List of Tables
List of Figures
Foreword by R.L. Rivest
Preface1. Overview of Cryptography
2. Mathematical Background
3. Number-Theoretic Reference Problems
4. Public-Key Parameters
5. Pseudorandom Bits and Sequences
6. Stream Ciphers
7. Block Ciphers
8. Public-Key Encryption
9. Hash Functions and Data Integrity
10. Identification and Entity Authentication
11. Digital Signatures
12. Key Establishment Protocols
13. Key Management Techniques
14. Efficient Implementation
15. Patents and StandardsBibliography of Papers from Selected Cryptographic Forums
References
Index
Return to the HAC home page