# zbMATH — the first resource for mathematics

##### Examples
 Geometry Search for the term Geometry in any field. Queries are case-independent. Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact. "Topological group" Phrases (multi-words) should be set in "straight quotation marks". au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted. Chebyshev | Tschebyscheff The or-operator | allows to search for Chebyshev or Tschebyscheff. "Quasi* map*" py: 1989 The resulting documents have publication year 1989. so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14. "Partial diff* eq*" ! elliptic The not-operator ! eliminates all results containing the word elliptic. dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles. py: 2000-2015 cc: (94A | 11T) Number ranges are accepted. Terms can be grouped within (parentheses). la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

##### Operators
 a & b logic and a | b logic or !ab logic not abc* right wildcard "ab c" phrase (ab c) parentheses
##### Fields
 any anywhere an internal document identifier au author, editor ai internal author identifier ti title la language so source ab review, abstract py publication year rv reviewer cc MSC code ut uncontrolled term dt document type (j: journal article; b: book; a: book article)
Handbook of applied cryptography. (English) Zbl 0868.94001
CRC Press Series on Discrete Mathematics and its Applications. Boca Raton, FL: CRC Press. xxviii, 780 p. $79.95;$ 96.00 (outside US) (1997).

This is an encyclopedic volume on the current status of the theory and practice of modern cryptography. The nature of cryptography and cryptographic protocols are fully presented, giving both a thorough treatment of the underlying theory and the practicalities of implementation. Thus both lower level topics such as random number generation and efficient implementation of number theoretic algorithms as well as more theoretical topics as zero-knowledge proofs, are given extensive treatment. The material has what the authors refer to as a functional organization where material of interest to an end user, such as authentication, is addressed in a single chapter. This is as opposed to what might be termed an academic organization where systems and protocols depending on the same concept, such as zero-knowledge, might be given in a single chapter.

To briefly cover the contents of the volume, the introductory chapters one to three give a broad overview of the field of modern cryptography and the mathematical background required for its study, including the number-theoretic background for factorization, a discussion of the discrete logarithm problem, the subset sum problem and the factorization of polynomials over finite fields. The fourth chapter considers primality testing and prime generation as it relates to choosing parameters for public key systems. The next three chapters deal with the generation of pseudorandom sequences, stream ciphers and block ciphers. The public key encryption systems of RSA, ElGamal, McEliece and knapsack, among others, are considered in chapter 8. All of the important hash functions and their use in data integrity and message authentication systems are discussed, followed by chapters on identification and entity authentication and digital signatures. Chapters 12 and 13 address the problems of key establishment and key management. Techniques for the efficient implementation of multi-precision integer arithmetic, including modular arithmetic, greatest common divisor algorithms, the Chinese remainder theorem, and exponentiation are given in Chapter 14. The final chapter gives a comprehensive review of the important patents and standards. The single appendix lists the titles of papers in the Proceedings of all the Asiacrypt/Auscrypt, Crypto, Eurocrypt and Fast Software Encryption Conferences as well as the Table of Contents of the Journal of Cryptology. An extensive bibliography of some 1276 references is given. It is of interest that there is no treatment of elliptic curve cryptosystems since two of the authors are major contributors to that field.

The material is exceptionally well organized and thoroughly treated. As Professor Rivest notes in his Foreword, "I am happy to ... inform the reader that he/she is looking at a landmark in the development of the field." The volume is a major contribution to the field of cryptography that will be serve as the standard reference for both theoretical researchers and practitioners alike for the foreseeable future.

##### MSC:
 94-00 Reference works (information and communication) 94A60 Cryptography