CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages
 Fifth Printing (August 2001) 
The Handbook was reprinted (5th printing) in August 2001. The publisher 
made all the various minor changes and updates we submitted.
You can identify the 5th printing of the book by looking for 
"5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.
You can order the handbook today from any one of these online bookstores:
 Sample Chapters FREE!!
CRC Press has generously given us permission to make all
chapters available for free download. 
 
Please read this copyright 
notice before downloading any of the chapters.
-  
Chapter 1 - Overview of Cryptography 
ps
pdf
 -  
Chapter 2 - Mathematics Background
ps
pdf
 -  
Chapter 3 - Number-Theoretic Reference Problems
ps
pdf
 -  
Chapter 4 - Public-Key Parameters 
ps
pdf
 -  
Chapter 5 - Pseudorandom Bits and Sequences 
ps
pdf
 -  
Chapter 6 - Stream Ciphers 
ps
pdf
 -  
Chapter 7 - Block Ciphers 
ps
pdf
 -  
Chapter 8 - Public-Key Encryption 
ps
pdf
 -  
Chapter 9 - Hash Functions and Data Integrity 
ps
pdf
 -  
Chapter 10 - Identification and Entity Authentication 
ps
pdf
 -  
Chapter 11 - Digital Signatures 
ps
pdf
 -  
Chapter 12 - Key Establishment Protocols 
ps
pdf
 -  
Chapter 13 - Key Management Techniques 
ps
pdf
 -  
Chapter 14 - Efficient Implementation 
ps
pdf
 -  
Chapter 15 - Patents and Standards 
ps
pdf
 -  
Appendix - Bibliography of Papers from Selected Cryptographic Forums 
ps
pdf
 -  
References 
ps
pdf
 -  
Index 
ps
pdf
 
 About the book 
Handbook of Applied Cryptography / 
ajmeneze at uwaterloo.ca / 
last updated March 13, 2006