Cover image for Handbook of applied cryptography
Title:
Handbook of applied cryptography
Personal Author:
Publication Information:
Boca Raton : CRC Press, 1997
ISBN:
9780849385230

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010133975 QA76.9.A25 M46 1997 Open Access Book Book
Searching...
Searching...
30000004013342 QA76.9.A25 M46 1997 Open Access Book Book
Searching...

On Order

Summary

Summary

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.

The Handbook of Applied Cryptography provides a treatment that is multifunctional:

It serves as an introduction to the more practical aspects of both conventional and public-key cryptography
It is a valuable source of the latest techniques and algorithms for the serious practitioner
It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit
It provides a mathematical treatment to accompany practical discussions
It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed
Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.


Reviews 1

Choice Review

Over the last two decades, the discipline of cryptography has witnessed explosive growth both in its diversity of techniques and its range of concerns. Mathematical methods replaced the ad hoc, and the construction of (and attack against) novel protocols such as zero-knowledge proofs, digital signatures, and secret sharing schemes now occupies the cryptographer as much as the age-old activities of making and breaking secret codes. This volume, addressed equally to the industrial practitioner, academic researcher, and student, does nothing less than provide a detailed and comprehensive overview of all these activities. Aiming the book at a wide audience and keeping it to a manageable size (if 780 pages can be called manageable) required two compromises of the authors: omitting language-specific source code (while providing detailed informal algorithm specifications), and omitting most rigorous argumentation (while providing adequate references). Thus the book forms a nice pair with more theoretical treatments, like Douglas R. Stinson's Cryptography: Theory and Practice (1995), to pick a recent example. Designed for reference and browsing, the authors still intend that a front-to-back read have "some merit." One hopes for their sake that the authors found a labor of love in compiling this enormous wealth of useful and fascinating information. Highly recommended for all academic library collections, undergraduate through faculty. D. V. Feldman University of New Hampshire