Nytro Posted May 3, 2011 Report Posted May 3, 2011 Handbook of Applied Cryptography Chapter 1 - Overview of Cryptography Chapter 2 - Mathematics Background Chapter 3 - Number-Theoretic Reference Problems Chapter 4 - Public-Key Parameters Chapter 5 - Pseudorandom Bits and Sequences Chapter 6 - Stream Ciphers Chapter 7 - Block Ciphers Chapter 8 - Public-Key Encryption Chapter 9 - Hash Functions and Data Integrity Chapter 10 - Identification and Entity Authentication Chapter 11 - Digital Signatures Chapter 12 - Key Establishment Protocols Chapter 13 - Key Management Techniques Chapter 14 - Efficient Implementation Chapter 15 - Patents and Standards Appendix - Bibliography of Papers from Selected Cryptographic Forums References IndexSursa: Handbook of Applied Cryptography Quote