Brief Table of Contents

List of Tables
List of Figures
Foreword by R.L. Rivest
Preface

1. Overview of Cryptography
2. Mathematical Background
3. Number-Theoretic Reference Problems
4. Public-Key Parameters
5. Pseudorandom Bits and Sequences
6. Stream Ciphers
7. Block Ciphers
8. Public-Key Encryption
9. Hash Functions and Data Integrity
10. Identification and Entity Authentication
11. Digital Signatures
12. Key Establishment Protocols
13. Key Management Techniques
14. Efficient Implementation
15. Patents and Standards

Bibliography of Papers from Selected Cryptographic Forums
References
Index


Return to the HAC home page