Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.
Use as historical reference only. Fifth reprinting (2005) of the 1996 edition. Some of the information is eighteen (18) years out of date.
Still, it should make for a useful read.
CRC Press has generously given us permission to make all chapters available for free download.
Please read this copyright notice before downloading any of the chapters.
- Table of Contents
ps- Chapter 1 – Overview of Cryptography
ps- Chapter 2 – Mathematics Background
ps- Chapter 3 – Number-Theoretic Reference Problems
ps- Chapter 4 – Public-Key Parameters
ps- Chapter 5 – Pseudorandom Bits and Sequences
ps- Chapter 6 – Stream Ciphers
ps- Chapter 7 – Block Ciphers
ps- Chapter 8 – Public-Key Encryption
ps- Chapter 9 – Hash Functions and Data Integrity
ps- Chapter 10 – Identification and Entity Authentication
ps- Chapter 11 – Digital Signatures
ps- Chapter 12 – Key Establishment Protocols
ps- Chapter 13 – Key Management Techniques
ps- Chapter 14 – Efficient Implementation
ps- Chapter 15 – Patents and Standards
ps- Appendix – Bibliography of Papers from Selected Cryptographic Forums
ps- References
ps- Index
ps