Handbook of Applied Cryptography homepage
Chapter 02
Mathematical Background
Chapter 03
Number-Theoretic Reference Problems
Chapter 04
Public-Key Parameters
Chapter 05
Pseudorandom Bits and Sequences
Chapter 06
Stream Ciphers
Chapter 07
Block Ciphers
Chapter 08
Public-Key Encryption
Chapter 09
Hash Functions and Data Integrity
Chapter 11
Digital Sigantures
Chapter 14
Efficient Implementation