Handbook of Applied Cryptography homepage
Chapter 02 Mathematical Background
Chapter 03 Number-Theoretic Reference Problems
Chapter 04 Public-Key Parameters
Chapter 05 Pseudorandom Bits and Sequences
Chapter 06 Stream Ciphers
Chapter 07 Block Ciphers
Chapter 08 Public-Key Encryption
Chapter 09 Hash Functions and Data Integrity
Chapter 11 Digital Sigantures
Chapter 14 Efficient Implementation