Vanstone, Scott A.
Overview
Works:  57 works in 180 publications in 2 languages and 2,897 library holdings 

Genres:  Handbooks and manuals Conference papers and proceedings 
Roles:  Author, Editor 
Classifications:  QA76.9.A25, 005.82 
Publication Timeline
.
Most widely held works by
Scott A Vanstone
Handbook of applied cryptography by
A. J Menezes(
Book
)
35 editions published between 1996 and 2001 in English and held by 992 WorldCat member libraries worldwide
Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and publickey cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a selfcontained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use
35 editions published between 1996 and 2001 in English and held by 992 WorldCat member libraries worldwide
Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and publickey cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a selfcontained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use
Guide to elliptic curve cryptography by
Darrel R Hankerson(
Book
)
21 editions published between 2003 and 2011 in English and held by 321 WorldCat member libraries worldwide
In addition, the book addresses some issues that arise in software and hardware implementation, as well as sidechannel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application."
21 editions published between 2003 and 2011 in English and held by 321 WorldCat member libraries worldwide
In addition, the book addresses some issues that arise in software and hardware implementation, as well as sidechannel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application."
An introduction to error correcting codes with applications by
Scott A Vanstone(
Book
)
18 editions published between 1989 and 2001 in English and held by 316 WorldCat member libraries worldwide
18 editions published between 1989 and 2001 in English and held by 316 WorldCat member libraries worldwide
Enumeration and design by
D. M Jackson(
Book
)
9 editions published in 1984 in English and Undetermined and held by 237 WorldCat member libraries worldwide
9 editions published in 1984 in English and Undetermined and held by 237 WorldCat member libraries worldwide
Advances in cryptologyCRYPTO '90 : proceedings by
A. J Menezes(
Book
)
17 editions published between 1990 and 2001 in English and held by 232 WorldCat member libraries worldwide
This volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 1115, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution, hash functions, zeroknowledge, randomness, applications, design and analysis, and impromptu talks
17 editions published between 1990 and 2001 in English and held by 232 WorldCat member libraries worldwide
This volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 1115, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution, hash functions, zeroknowledge, randomness, applications, design and analysis, and impromptu talks
Coding theory, design theory, group theory : proceedings of the Marshall Hall Conference by Marshall Hall Conference(
Book
)
9 editions published in 1993 in English and held by 167 WorldCat member libraries worldwide
9 editions published in 1993 in English and held by 167 WorldCat member libraries worldwide
An introduction to mathematical thinking : algebra and number systems by
William J Gilbert(
Book
)
5 editions published in 2005 in English and held by 77 WorldCat member libraries worldwide
5 editions published in 2005 in English and held by 77 WorldCat member libraries worldwide
Selected papers in combinatorics : a volume dedicated to R.G. Stanton(
Book
)
4 editions published between 1991 and 1992 in English and held by 43 WorldCat member libraries worldwide
4 editions published between 1991 and 1992 in English and held by 43 WorldCat member libraries worldwide
Classical algebra by
William J Gilbert(
Book
)
4 editions published between 1988 and 2000 in English and held by 29 WorldCat member libraries worldwide
4 editions published between 1988 and 2000 in English and held by 29 WorldCat member libraries worldwide
The existence of orthogonal resolutions of lines in AG(n, q) by
Ryoh FujiHara(
Book
)
3 editions published between 1980 and 1981 in English and held by 3 WorldCat member libraries worldwide
3 editions published between 1980 and 1981 in English and held by 3 WorldCat member libraries worldwide
Provably secure implicit certificate schemes by
David Brown(
Book
)
1 edition published in 2000 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2000 in English and held by 2 WorldCat member libraries worldwide
Isomorphism classes of elliptic curves over finite fields by
A. J Menezes(
Book
)
1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide
On the construction of low complexity normal bases by
D. W. (David W.) Ash(
Book
)
1 edition published in 1986 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1986 in English and held by 2 WorldCat member libraries worldwide
On the existence of doubly resolvable Kirkman systems and equidistant permutation arrays by
R. A Mathon(
Book
)
2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide
2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide
Doubly resolvable designs by
Scott A Vanstone(
Book
)
2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide
2 editions published in 1979 in English and held by 2 WorldCat member libraries worldwide
Message authentication codes with error correcting capabilities by
Charles C. Y Lam(
Book
)
1 edition published in 2002 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2002 in English and held by 2 WorldCat member libraries worldwide
Transversal designs and doubly resolvable designs by
R FujiHara(
Book
)
1 edition published in 1980 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1980 in English and held by 2 WorldCat member libraries worldwide
Isomorphism of strong starters in cyclic groups by K. T Phelps(
Book
)
1 edition published in 1986 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1986 in English and held by 2 WorldCat member libraries worldwide
Kryptografia stosowana by
A. J Menezes(
Book
)
1 edition published in 2005 in Polish and held by 2 WorldCat member libraries worldwide
1 edition published in 2005 in Polish and held by 2 WorldCat member libraries worldwide
Applications of finite fields by
Ian F Blake(
Book
)
2 editions published in 1993 in English and held by 1 WorldCat member library worldwide
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good errorcorrecting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject
2 editions published in 1993 in English and held by 1 WorldCat member library worldwide
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good errorcorrecting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject
more
fewer
Audience Level
0 

1  
Kids  General  Special 
Related Identities
 Menezes, A. J. (Alfred J.) 1965 Author Editor
 Van Oorschot, Paul C. Author Editor
 Hankerson, Darrel R. Author
 University of Waterloo Publisher
 Jackson, D. M. Author Editor
 Jungnickel, D. (Dieter) 1952 Author Editor
 Hall, Marshall 19101990
 Gilbert, William J. 1941 Author
 LINK (Online service)
 Menezes, Alfred J. (1965 ...). Author
Useful Links
Associated Subjects
Algebra Algebraic logic Algebraic number theory Block designs Canada Coding theory Combinatorial analysis Combinatorial designs and configurations Combinatorial enumeration problems Combinatorial group theory Computational complexity Computer engineering Computer networksSecurity measures Computers ComputersAccess control Computer science Computer security Cryptography Curves, Elliptic Data encryption (Computer science) Data transmission systems Data transmission systemsSecurity measures Engineering Engineering mathematics Errorcorrecting codes (Information theory) Finite fields (Algebra) Geometry, Affine Group theory Incomplete block designs Isomorphisms (Mathematics) MathematicsPhilosophy Number concept Paths and cycles (Graph theory) Permutations Postal serviceMetered mail Postal serviceSecurity measures Public key cryptography Scientists United States
Alternative Names
Scott A. Vanstone Cryptographer
Scott Vanstone
Scott Vanstone Cryptographer
Vanstone, S.A.
Vanstone, S. A. 19472014
Vanstone, S. A. (Scott A.)
Vanstone, S. A. (Scott A.), 19472014
Vanstone, Scott.
Vanstone, Scott A.
Vanstone, Scott A. 1947
Vanstone, Scott Alexander.
Vanstone, Scott Alexander 1947
Vanstone, Scott Alexander 19472014
スコット・ヴァンストーン
Languages
Covers