Full Description
They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.



