Menezes, A. J. (Alfred J.) 1965
Overview
Works:  47 works in 205 publications in 4 languages and 3,948 library holdings 

Genres:  Conference proceedings Handbooks, manuals, etc 
Roles:  Author, Editor 
Classifications:  QA76.9.A25, 005.82 
Publication Timeline
.
Most widely held works by
A. J Menezes
Handbook of applied cryptography
by
A. J Menezes(
Book
)
35 editions published between 1996 and 2005 in English and Polish and held by 1,021 WorldCat member libraries worldwide
Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and publickey cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a selfcontained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use
35 editions published between 1996 and 2005 in English and Polish and held by 1,021 WorldCat member libraries worldwide
Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and publickey cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a selfcontained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use
Topics in cryptologyCTRSA 2005 the cryptographers' track at the RSA Conference 2005, San Francisco, CA, USA, February 1418, 2005 : proceedings
by
A. J Menezes(
)
18 editions published in 2005 in English and held by 575 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2004, CTRSA 2004, held in San Francisco, CA, USA in February 2004. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on cryptanalysis, public key encryption, signature schemes, design principles, passwordbased protocols, pairings, and efficient and secure implementations
18 editions published in 2005 in English and held by 575 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2004, CTRSA 2004, held in San Francisco, CA, USA in February 2004. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on cryptanalysis, public key encryption, signature schemes, design principles, passwordbased protocols, pairings, and efficient and secure implementations
Advances in cryptology  CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 1923, 2007 ; proceedings
by
Moni Naor(
)
15 editions published in 2007 in English and held by 537 WorldCat member libraries worldwide
Annotation
15 editions published in 2007 in English and held by 537 WorldCat member libraries worldwide
Annotation
Guide to elliptic curve cryptography
by
Darrel R Hankerson(
Book
)
23 editions published between 2003 and 2011 in English and held by 437 WorldCat member libraries worldwide
"This reference is a unique and indispensable resource for practitioners, professionals, and researchers in computer science, computer engineering network design, and network data security."BOOK JACKET
23 editions published between 2003 and 2011 in English and held by 437 WorldCat member libraries worldwide
"This reference is a unique and indispensable resource for practitioners, professionals, and researchers in computer science, computer engineering network design, and network data security."BOOK JACKET
Advances in cryptologyCRYPTO '90 : proceedings
by
A. J Menezes(
Book
)
21 editions published between 1990 and 2001 in 3 languages and held by 378 WorldCat member libraries worldwide
This volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 1115, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution,hash functions, zeroknowledge, randomness, applications, design and analysis, and impromptu talks
21 editions published between 1990 and 2001 in 3 languages and held by 378 WorldCat member libraries worldwide
This volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 1115, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution,hash functions, zeroknowledge, randomness, applications, design and analysis, and impromptu talks
Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 1618, 2002 : proceedings
by
A. J Menezes(
Book
)
18 editions published in 2002 in English and held by 336 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new publickey schemes, foundations, publickey infrastructures, fingerprinting and watermarking, publickey protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
18 editions published in 2002 in English and held by 336 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new publickey schemes, foundations, publickey infrastructures, fingerprinting and watermarking, publickey protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
Applications of finite fields
by
Ian F Blake(
Book
)
10 editions published between 1993 and 2011 in English and held by 267 WorldCat member libraries worldwide
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good errorcorrecting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject
10 editions published between 1993 and 2011 in English and held by 267 WorldCat member libraries worldwide
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good errorcorrecting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject
Elliptic curve public key cryptosystems
by
A. J Menezes(
Book
)
14 editions published between 1993 and 2002 in English and Undetermined and held by 223 WorldCat member libraries worldwide
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an uptodate and selfcontained treatment of elliptic curvebased public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject
14 editions published between 1993 and 2002 in English and Undetermined and held by 223 WorldCat member libraries worldwide
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an uptodate and selfcontained treatment of elliptic curvebased public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject
Algebraic aspects of cryptography
by
Neal Koblitz(
Book
)
11 editions published between 1998 and 2004 in English and Polish and held by 118 WorldCat member libraries worldwide
This is a textbook for a course (or selfinstruction) in cryptography with emphasis on algebraic methods. The first half of the book is a selfcontained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half  "hidden monomial" systems, combinatorialalgebraic systems, and hyperelliptic systems  has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: " ... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D. Burmester, Mathematical Reviews 2002 " ... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 " ... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E. Leiss, Computing Reviews 1998
11 editions published between 1998 and 2004 in English and Polish and held by 118 WorldCat member libraries worldwide
This is a textbook for a course (or selfinstruction) in cryptography with emphasis on algebraic methods. The first half of the book is a selfcontained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half  "hidden monomial" systems, combinatorialalgebraic systems, and hyperelliptic systems  has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: " ... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D. Burmester, Mathematical Reviews 2002 " ... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 " ... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E. Leiss, Computing Reviews 1998
Advances in cryptology  CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 1923, 2007 ; proceedings
(
Visual
)
1 edition published in 2007 in English and held by 3 WorldCat member libraries worldwide
1 edition published in 2007 in English and held by 3 WorldCat member libraries worldwide
An elementary introduction to hyperelliptic curves
by
A. J Menezes(
Book
)
1 edition published in 1996 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1996 in English and held by 2 WorldCat member libraries worldwide
Another look at generic groups
by
Neal Koblitz(
Book
)
1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide
Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree
by
Markus Maurer(
Book
)
1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide
Formulas for cube roots in F₃[subscript m]
by
Omran Ahmadi(
Book
)
2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide
2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide
Elliptic curve cryptosystems
by
A. J Menezes(
Book
)
1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide
Another look at HMQV
by
A. J Menezes(
Book
)
1 edition published in 2005 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2005 in English and held by 2 WorldCat member libraries worldwide
Software implementation of elliptic curve crytography over binary fields
by
Darrel R Hankerson(
Book
)
1 edition published in 2000 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2000 in English and held by 2 WorldCat member libraries worldwide
Representations in finite fields
by
A. J Menezes(
Book
)
2 editions published between 1988 and 1989 in English and held by 2 WorldCat member libraries worldwide
2 editions published between 1988 and 1989 in English and held by 2 WorldCat member libraries worldwide
Isomorphism classes of elliptic curves over finite fields
by
A. J Menezes(
Book
)
1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide
Another look at "provable security"
by
Neal Koblitz(
Book
)
1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide
more
fewer
Audience Level
0 

1  
Kids  General  Special 
Related Identities
 Vanstone, Scott A. Editor
 Van Oorschot, Paul C. Editor
 International Association for Cryptologic Research
 Hankerson, Darrel R. Author
 Blake, Ian F. Author
 Sarkar, Palash 1969 Editor
 Koblitz, Neal Author
 Sarkar, Palash Editor
 LINK (Online service)
 University of Waterloo Department of Combinatorics and Optimization
Useful Links
Associated Subjects
Coding theory Combinatorial analysis Combinatorial group theory Computational complexity Computer engineering ComputersAccess control Computer science Computer security Computer software Cryptography CryptographyMathematics Cube root Curves, Elliptic Data encryption (Computer science) Data protection Data structures (Computer science) Data transmission systemsSecurity measures Engineering Engineering mathematics Finite fields (Algebra) Isomorphisms (Mathematics) Logarithms Mathematics Number theory Operating systems (Computers) Proof theory Public key cryptography Public key infrastructure (Computer security)
Alternative Names
Menezes, A. J.
Menezes, A. J. 1965
Menezes, A. J. (Alfred J.), 1965
Menezes, A. J. (Alfred John) 1965
Menezes, Alfred.
Menezes, Alfred 1965
Menezes, Alfred (Alfred J.), 1965
Menezes, Alfred J.
Menezes, Alfred J. 1965
Menezes, Alfred John.
Menezes, Alfred John 1965
Languages
Covers