AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone ISBN: 0-8493-8523-7 Publisher: CRC Press Pub. Date: 16 October, 1996 Format: Hardcover Volumes: 1 List Price(USD): $99.95 |
Average Customer Rating: 4.67 (15 reviews)
Rating: 5
Summary: An excellent reference for anyone in computer science
Comment: A thorough coverage of topics in cryptography is only one of many features which make this book invaluable to computer scientists. While not intended to be a textbook, this handbook includes enough background information to be of use to those with minimal theoretical computer science knowledge. The chapter organization is logical and very modular so that after reading the introductory chapters, one can skip ahead to the chapters of interest with little difficulty.
The second chapter provides a concise review of probability theory, information theory, complexity theory, and number theory. This chapter would be helpful to anyone in computer science who already has some discrete math background. For readers with no discrete math background I would recommend first reading "Discrete Mathematics and Its Applications" by Kenneth Rosen, the editor of the series this book belongs to.
The coverage of number-theoretic problems in chapter 3 is very easy to follow and provides a handy reference to the average case performance of the best known algorithms for each.
The next few chapters are very math-intensive and outline the most common encryption algorithms and standards with examples. The chapter on block ciphers includes a section on classical ciphers and cryptanalysis which, as a sidenote, might be of interest to students of linguistics.
The later chapters present protocols for authentication, digital signing, and key management which build on the algorithms of the previous chapters, but can be understood independently.
One of the final chapters presents methods of effecient computation which again would be useful to anyone in computer science, not just those who are interested in cryptography.
Overall, the development of the topics in the book is complete (although by no means rigorous) and concise, including examples only where necessary. I highly recommend this book to students who want to learn more about cryptography, anyone whose job requires some knowledge of standards for authentication, digital signing, etc., such as internet security, and any computer scientist who has an academic interest in algorithms and their applications.
Rating: 5
Summary: Excellent reference indeed
Comment: If you're going to work in the area of Cryptography, you can't afford
to neglect this book.
We used this in a course, and even though it's a handbook, it doubles up
pretty well as a textbook, since it has all the underlying mathematical
theory, presented in a clear and concise manner.
For sheer breadth and depth of coverage, this book is unmatched in the
field. It may not have enough on some topics to satisfy everyone, but
then i suspect most such topics were not so prominent in 1996, which
is when the book was written.
Starting with number theory, it goes on cover pseudorandom bits and
sequences, stream and block ciphers, hash functions, and digital signatures,
establishment protocols, implementation, patents and standards - you name
it, you got it.
On the one hand, there's enough theory to make you wonder whether it
should be called 'applied', but then it indeed qualifies as implementations
are discussed as well.
And of course, there's an exhaustive bibliography, with more pointers to
the literature than one could possibly follow up.
One word of caution, though : it requires hard work. If you want a more
'relaxed' coverage of comparable breadth (but not depth), you can do
worse than look up Bruce Schneier's 'Applied Crypography', which is a
delightful read, but nowhere as rigorous (read academic) as this one.
All in all, this is an indispensable reference for those in the field -
rigorous and exhaustive, yet eminently readable.
If you still haven't made your mind up, here's one final piece of advice :
visit the authors'(rather the book's) website, where you'll get the
implementations of all the algorithms in the book, and a (presumably)
pleasant surprise :-)
Rating: 5
Summary: Fantastic traditional reference
Comment: This book is available at: http://www.cacr.math.uwaterloo.ca/hac/
The Chapter 14 - Efficient Implementation - shows several multiple precision algorithms. They are very easy to understand and implement under any microprocessor. It is a very good complement to the book set written by Donald Knuth (The Art of Computer Programming, Volumes 1-3 Boxed Set), another fantastic traditional reference.
![]() |
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier ISBN: 0471117099 Publisher: John Wiley & Sons Pub. Date: 18 October, 1995 List Price(USD): $60.00 |
![]() |
Title: Cryptography in C and C++ by Michael Welschenbach ISBN: 189311595X Publisher: APress Pub. Date: May, 2001 List Price(USD): $49.95 |
![]() |
Title: Practical Cryptography by Niels Ferguson, Bruce Schneier ISBN: 0471223573 Publisher: John Wiley & Sons Pub. Date: 28 March, 2003 List Price(USD): $50.00 |
![]() |
Title: Cryptography and Network Security: Principles and Practice (3rd Edition) by William Stallings ISBN: 0130914290 Publisher: Prentice Hall Pub. Date: 27 August, 2002 List Price(USD): $75.00 |
![]() |
Title: Security Engineering: A Guide to Building Dependable Distributed Systems by Ross J. Anderson, Ross Anderson ISBN: 0471389226 Publisher: John Wiley & Sons Pub. Date: 22 January, 2001 List Price(USD): $65.00 |
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments