Menezes, A. J. (Alfred J.) 1965
Overview
Works:  51 works in 236 publications in 4 languages and 4,534 library holdings 

Genres:  Conference papers and proceedings Handbooks and manuals 
Roles:  Author, Editor 
Classifications:  QA76.9.A25, 005.82 
Publication Timeline
.
Most widely held works by
A. J Menezes
Handbook of applied cryptography by
A. J Menezes(
Book
)
37 editions published between 1996 and 2001 in English and held by 995 WorldCat member libraries worldwide
Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and publickey cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a selfcontained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use
37 editions published between 1996 and 2001 in English and held by 995 WorldCat member libraries worldwide
Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and publickey cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a selfcontained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use
Guide to elliptic curve cryptography by
Darrel R Hankerson(
Book
)
22 editions published between 2003 and 2011 in English and held by 321 WorldCat member libraries worldwide
In addition, the book addresses some issues that arise in software and hardware implementation, as well as sidechannel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application."
22 editions published between 2003 and 2011 in English and held by 321 WorldCat member libraries worldwide
In addition, the book addresses some issues that arise in software and hardware implementation, as well as sidechannel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application."
Advances in cryptologyCRYPTO '90 : proceedings by
A. J Menezes(
Book
)
26 editions published between 1990 and 2008 in 3 languages and held by 289 WorldCat member libraries worldwide
Annotation This volume gives the proceedings of Crypto '90, held at theUniversity of California at Santa Barbara, August 1115,1990. The conference attracted 227 participants from twentycountries, with attendees from academia, industry, andgovernment. The program provided a balance between thetheoretical and the practical aspects of cryptography tomeet the needs and diversified interests of the variousgroups. The selected papers are organized into sections oncryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, keydistribution, hash functions, zeroknowledge, randomness, applications, design and analysis, and impromptu talks
26 editions published between 1990 and 2008 in 3 languages and held by 289 WorldCat member libraries worldwide
Annotation This volume gives the proceedings of Crypto '90, held at theUniversity of California at Santa Barbara, August 1115,1990. The conference attracted 227 participants from twentycountries, with attendees from academia, industry, andgovernment. The program provided a balance between thetheoretical and the practical aspects of cryptography tomeet the needs and diversified interests of the variousgroups. The selected papers are organized into sections oncryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, keydistribution, hash functions, zeroknowledge, randomness, applications, design and analysis, and impromptu talks
Applications of finite fields by
Ian F Blake(
Book
)
14 editions published between 1993 and 2011 in English and held by 257 WorldCat member libraries worldwide
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good errorcorrecting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject
14 editions published between 1993 and 2011 in English and held by 257 WorldCat member libraries worldwide
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, has played a part in various branches of mathematics, in recent years there has been a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. Applications of Finite Fields introduces some of these recent developments. This book focuses attention on some specific recent developments in the theory and applications of finite fields. While the topics selected are treated in some depth, Applications of Finite Fields does not attempt to be encyclopedic. Among the topics studied are different methods of representing the elements of a finite field (including normal bases and optimal normal bases), algorithms for factoring polynomials over finite fields, methods for constructing irreducible polynomials, the discrete logarithm problem and its implications to cryptography, the use of elliptic curves in constructing public key cryptosystems, and the uses of algebraic geometry in constructing good errorcorrecting codes. This book is developed from a seminar held at the University of Waterloo. The purpose of the seminar was to bridge the knowledge of the participants whose expertise and interests ranged from the purely theoretical to the applied. As a result, this book will be of interest to a wide range of students, researchers and practitioners in the disciplines of computer science, engineering and mathematics. Applications of Finite Fields is an excellent reference and may be used as a text for a course on the subject
Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December
1618, 2002 : proceedings by
A. J Menezes(
Book
)
20 editions published in 2002 in English and held by 245 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new publickey schemes, foundations, publickey infrastructures, fingerprinting and watermarking, publickey protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
20 editions published in 2002 in English and held by 245 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new publickey schemes, foundations, publickey infrastructures, fingerprinting and watermarking, publickey protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
Elliptic curve public key cryptosystems by
A. J Menezes(
Book
)
16 editions published between 1993 and 2002 in English and Undetermined and held by 214 WorldCat member libraries worldwide
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an uptodate and selfcontained treatment of elliptic curvebased public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject
16 editions published between 1993 and 2002 in English and Undetermined and held by 214 WorldCat member libraries worldwide
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an uptodate and selfcontained treatment of elliptic curvebased public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject
Topics in cryptology, CTRSA 2001 : the Cryptographers' Track at RSA Conference 2001, San Francisco, CA, USA, April 2001 :
proceedings by
David Naccache(
Book
)
21 editions published in 2005 in English and held by 138 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Cryptographers' Track at RSA Conference 2001, CTRSA 2001, in San Francisco, CA, USA in April 2001. The 33 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on new cryptosystems; RSA; symmetric cryptography; gambling and lotteries; reductions, constructions, and security proofs; flaws and attacks; implementation; multivariate cryptography; number theoretic problems; passwords and credentials; and protocols
21 editions published in 2005 in English and held by 138 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Cryptographers' Track at RSA Conference 2001, CTRSA 2001, in San Francisco, CA, USA in April 2001. The 33 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on new cryptosystems; RSA; symmetric cryptography; gambling and lotteries; reductions, constructions, and security proofs; flaws and attacks; implementation; multivariate cryptography; number theoretic problems; passwords and credentials; and protocols
Algebraic aspects of cryptography by
Neal Koblitz(
Book
)
12 editions published between 1998 and 2004 in English and held by 133 WorldCat member libraries worldwide
This is a textbook for a course (or selfinstruction) in cryptography with emphasis on algebraic methods. The first half of the book is a selfcontained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half  "hidden monomial" systems, combinatorialalgebraic systems, and hyperelliptic systems  has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: " ... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D. Burmester, Mathematical Reviews 2002 " ... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 " ... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E. Leiss, Computing Reviews 1998
12 editions published between 1998 and 2004 in English and held by 133 WorldCat member libraries worldwide
This is a textbook for a course (or selfinstruction) in cryptography with emphasis on algebraic methods. The first half of the book is a selfcontained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half  "hidden monomial" systems, combinatorialalgebraic systems, and hyperelliptic systems  has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. From the reviews: " ... This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ... Overall, this is an excellent expository text, and will be very useful to both the student and researcher." M.V.D. Burmester, Mathematical Reviews 2002 " ... I think this book is a very inspiring book on cryptography. It goes beyond the traditional topics (most of the cryptosystems presented here are first time in a textbook, some of Patarin's work is not published yet). This way the reader has the feeling how easy to suggest a cryptosystem, how easy to break a safe looking system and hence how hard to trust one. The interested readers are forced to think together with their researchers and feel the joy of discovering new ideas. At the same time the importance of "hardcore" mathematics is emphasized and hopefully some application driven students will be motivated to study theory." P. Hajnal, Acta Scientiarum Mathematicarum 64.1998 " ... Overall, the book is highly recommended to everyone who has the requisite mathematical sophistication." E. Leiss, Computing Reviews 1998
Advances in cryptology  CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 1923,
2007 ; proceedings by
A. J Menezes(
Book
)
16 editions published in 2007 in English and held by 123 WorldCat member libraries worldwide
Annotation
16 editions published in 2007 in English and held by 123 WorldCat member libraries worldwide
Annotation
Progress in cryptology  LATINCRYPT 2014 : third International Conference on Cryptology and Information Security in Latin
America Florianópolis, Brazil, September 1719, 2014 : revised selected papers by
Diego F Aranha(
Book
)
9 editions published in 2015 in English and held by 7 WorldCat member libraries worldwide
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, sidechannel attacks and countermeasures, privacy, crypto analysis, and cryptographic protocols
9 editions published in 2015 in English and held by 7 WorldCat member libraries worldwide
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, sidechannel attacks and countermeasures, privacy, crypto analysis, and cryptographic protocols
Advances in cryptology  CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 1923,
2007 ; proceedings(
Visual
)
1 edition published in 2007 in English and held by 5 WorldCat member libraries worldwide
1 edition published in 2007 in English and held by 5 WorldCat member libraries worldwide
Another look at "provable security" by
Neal Koblitz(
Book
)
1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide
An elementary introduction to hyperelliptic curves by
A. J Menezes(
Book
)
1 edition published in 1996 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1996 in English and held by 2 WorldCat member libraries worldwide
Elliptic curve cryptosystems by
A. J Menezes(
Book
)
1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1992 in English and held by 2 WorldCat member libraries worldwide
Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree by
Markus Maurer(
Book
)
1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide
Isomorphism classes of elliptic curves over finite fields by
A. J Menezes(
Book
)
1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 1990 in English and held by 2 WorldCat member libraries worldwide
Kryptografia stosowana by
A. J Menezes(
Book
)
1 edition published in 2005 in Polish and held by 2 WorldCat member libraries worldwide
1 edition published in 2005 in Polish and held by 2 WorldCat member libraries worldwide
Software implementation of elliptic curve crytography over binary fields by
Darrel R Hankerson(
Book
)
1 edition published in 2000 in English and held by 2 WorldCat member libraries worldwide
1 edition published in 2000 in English and held by 2 WorldCat member libraries worldwide
Formulas for cube roots in F₃[subscript m] by
Omran Ahmadi(
Book
)
2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide
2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide
Progress in Cryptology INDOCRYPT 2002 00 : Third International Conference on Cryptology in India Hyderabad, India, December
1618, 2002 Proceedings(
)
1 edition published in 2002 in English and held by 0 WorldCat member libraries worldwide
1 edition published in 2002 in English and held by 0 WorldCat member libraries worldwide
more
fewer
Audience Level
0 

1  
Kids  General  Special 
Related Identities
 Vanstone, Scott A. Editor
 Van Oorschot, Paul C. Editor
 Hankerson, Darrel R. Author
 International Association for Cryptologic Research
 Sarkar, Palash 1969 Editor
 Blake, Ian F. Author
 Aranha, Diego F. Author Editor
 Koblitz, Neal Author
 LINK (Online service)
 Gao, XuHong
Useful Links
Associated Subjects
Coding theory Combinatorial analysis Computational complexity Computer engineering Computers ComputersAccess control Computer science Computer security Computer software Cryptography CryptographyMathematics Cube root Curves, Elliptic Data encryption (Computer science) Data protection Data structures (Computer science) Data transmission systemsSecurity measures Engineering Engineering mathematics Finite fields (Algebra) Isomorphisms (Mathematics) Logarithms Mathematics Number theory Operating systems (Computers) Proof theory Public key cryptography Public key infrastructure (Computer security)
Alternative Names
Alfred J. Menezes cryptographer
Menezes, A.J.
Menezes, A. J. 1965
Menezes, A. J. (Alfred J.), 1965
Menezes, A. J. (Alfred John) 1965
Menezes, Alfred.
Menezes, Alfred 1965
Menezes, Alfred (Alfred J.), 1965
Menezes, Alfred J.
Menezes, Alfred J. 1965
Menezes, Alfred John.
Menezes, Alfred John 1965
アルフレッド・メネゼス
Languages
Covers