
|
|
|
|
Home / Science / Math / Applications / Communication Theory / Cryptography / Books
|
| Categories |
|
|
- Science/ Math/ Applications/ Communication Theory/ Cryptography/ People/ Spafford, Gene/ Books@ (2)
|
|
|
|
|
Web Sites
|
- A Course in Number Theory and Cryptography - Neal Koblitz. An algorithmic approach that covers basic arithmetic topics all the way to elliptic curves.
www.springer-ny.com/detail.tpl?isbn=0387942939
- Algebraic Aspects of Cryptography - Neal Koblitz. A textbook for a course, or self-instruction, in cryptography with emphasis on algebraic methods.
www.springer-ny.com/detail.tpl?isbn=3540634460
- An Introduction to Cryptography - Richard A. Mollin. Intended for a one-semester introductory undergraduate course in cryptography. Covers symmetric and public key systems with chapters on advanced topics.
www.math.ucalgary.ca/~ramollin/cryptopref.html
- Applied Cryptography - Bruce Schneier. A comprehensive tutorial and reference but a little light on mathematical theory.
www.counterpane.com/applied.html
- Codes and Ciphers - Robert Churchhouse. Describes and analyses systems from the earliest to the most recent.
uk.cambridge.org/mathematics/catalogue/052181054X/default.htm
- Coding Theory and Cryptography - David Joyner, editor. Proceedings of the 'Conference on Coding Theory, Cryptography, and Number Theory' held at the U.S. Naval Academy during October 25-26, 1998
www.springer-ny.com/detail.tpl?isbn=3540663363
- Contemporary Cryptology - Gustavus J. Simmons. Subtitled "The Science of Information Integrity". Has emphasis on the cryptographic elements of the subject.
www.wiley.com/cda/product/0,,0780353528,00.html
- Cryptography and E-Commerce - Jon C. Graff. Geared to nontechnical managers who want to explore the underlying concepts of this topic.
www.wiley.com/cda/product/0,,0471405744,00.html
- Cryptography Decrypted - Mel and Baker. Divided into four parts, secret keys and secret key methods, public and private keys, how keys are distributed through digital certificates, and three real-world systems.
cseng.aw.com/book/0,3828,0201616475,00.html
- Cryptography for Visual Basic - Richard Bondi. Subtitled "A Programmers Guide to the Microsoft CryptoAPI" which describes what the book is about.
www.cryptovb.com/books/bondi/bondi.html
- Cryptography Theory and Practice - Douglas Stinson. Subtitled "Discrete Mathematics and Its Applications". Written with more emphasis on theory than practice, as acknowledged in the preface.
www.cacr.math.uwaterloo.ca/~dstinson/CTAP.html
- Decrypted Secrets - Friedrich L. Bauer. Subtitled "Methods and Maxims of Cryptology". Covers both cryptography and cryptanalysis.
www.springer-ny.com/detail.tpl?isbn=3540426744
- Elementary Cryptanalysis - Abraham Sinkov. An older book (1966) that covers the mathematical side of elementary cryptography. Published by 'The Mathematical Association of America'.
www.maa.org/pubs/books/nml22.html
- Foundations of Cryptography - Oded Goldreich. Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs.
uk.cambridge.org/mathematics/catalogue/0521791723
- Handbook of Applied Cryptography - The online version of the 1996 CRC book by Menezes, van Oorschot and Vanstone.
www.cacr.math.uwaterloo.ca/hac
- Primality and Cryptography - Evangelos Kranakis. A comprehensive account of recent algorithms developed in computational number theory and primality testing.
www.wiley.com/cda/product/0,,0471909343,00.html
- RSA Security's Official Guide to Cryptography - Burnett and Paine. Explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security and how the RSA algorithm works within protocols.
www.osborne.com/networking_comm/007213139X/007213139X.shtml
- The Code Book - Simon Singh. Traces the development of codes and code-breaking from military espionage in ancient Greece to modern computer ciphers.
www.simonsingh.com/codebook.htm
- The Mathematics of Ciphers - S.C. Coutinho. An introduction to number theory and its applications to cryptography. A revised and updated translation from original in Portuguese.
www.dcc.ufrj.br/~collier/rsabook.htm
- The Twofish Encryption Algorithm - Schneier, et al. Covers design, performance, instructions and source code in C.
www.wiley.com/cda/product/0,,0471353817,00.html
|
|
|
|
|