If you are looking for the Handbook of Applied Cryptography (1996), visit here.
For An Introduction to Error Correcting Codes with Applications (1989), visit here.
Or see here for a list of reference books on security/cryptography and other miscellaneous resources and advice.

new Second Edition (October 2021):
image of front cover

Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, Second Edition
by Paul C. van Oorschot. Springer, 2021.
2e ISBN: 978-3-030-83410-4 (hardcopy), 978-3-030-83411-1 (eBook)
The official version is available from Springer (2e) and major booksellers.
All official hardback copies (1e and 2e) should have color figures and color highlighted text.
A single-file full-book PDF is available from university libraries and SpringerLink (2e).

Reviews (2e): B. Rothke (RSA Conference), R. Farrow (USENIX ;login:), S. Dietrich (IEEE Cipher).
Reviews (1e): N. Asokan (U. Waterloo), S. Dietrich (Cipher newsletter), Edgar Weippl (U. Vienna),
... JH Davenport (Computing Reviews), S Escobar (Computing Reviews).
Shorter comments: Amazon.com, Risks Digest, Goodreads, Schneier on Security.

The book copy on this site is a self-archived author-created version for personal use.
Reposting and all other forms of redistribution are strictly prohibited.
Copyright (c)2020-2021 Paul C. van Oorschot. Under publishing license to Springer.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Back cover (includes the objectives of the book; see also the preface in the Frontmatter below).
2nd Edition (published October 14, 2021), 446 pages plus frontmatter.
New chapters (12, 13), plus editorial revisions (retaining 1e pagination) and updated index. Page-range(chapter-number) mapping, e.g., for mapping index entries to chapter:
1-28(ch1) 29-54(2) 55-90(3) 91-124(4) 125-154(5) 155-182(6) 183-213(7)
214-244(8) 245-280(9) 281-308(10) 309-338(11) 339-374(12) 375-410(13) 411-414(epi.)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Errata post-2e. These are reflected in the above PDF files, but not the printed Second Edition.
p34, line n-2. SHA-3 resulted from a NIST competition (but not SHA-1 or SHA-2).
p361. Section 12.7's title ends with "(WPA2)"; the next sentence notes AES-CCMP is WPA2's core part.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1st Edition (published April 2020; 365 pages plus frontmatter).
ISBN: 978-3-030-33648-6 (hardcopy), 978-3-030-33649-3 (eBook).
A single-file full-book PDF is available from university libraries and SpringerLink (1e).
The official hardcopy version is available from Springer (1e) and major booksellers.
Chapter PDFs (version 25 Sept 2019, as published): ToC-1e 1 2 3 4 5 6 7 8 9 10 11 epilog index
First edition front and back cover and book flyer.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Feedback and suggestions are welcome: pvanoorschot (at) gmail.com
I hope that you enjoy and use this book. Thanks to all who helped along the way.
-pvo (Ottawa, Canada).
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -