Books On Cryptography - List

List

Significant books on cryptography include:

  • Gaines, Helen Fouché – Cryptanalysis, 1939, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. It reflects public amateur practice as of the inter-War period. The book was compiled as one of the first projects of the American Cryptogram Association.
  • Dominic Welsh – Codes and Cryptography, Oxford University Press, 1988. A brief textbook intended for undergraduates. Some coverage of fundamental information theory. Requires some mathematical maturity; is well written, and otherwise accessible.
  • Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
  • Konheim, Alan G. (1981). Cryptography: A Primer, John Wiley & Sons, ISBN 0-471-08132-9. Written by one of the IBM team who developed DES.
  • Jonathan Katz and Yehuda Lindell's Introduction to Modern Cryptography, CRC Press. Presents modern cryptography at a level appropriate for undergraduates, graduate students, or practitioners. Assumes mathematical maturity but presents all the necessary mathematical and computer science background.
  • Mao, Wenbo (2004).Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind.
  • Douglas Stinson – Cryptography: Theory and Practice ISBN 1-58488-508-4. Covers topics in a textbook style but with more mathematical detail than is usual.
  • Nigel Smart – Cryptography: An introduction ISBN 0-07-709987-7 (online version). Similar in intent to Applied Cryptography but less comprehensive. Covers more modern material and is aimed at undergraduates covering topics such as number theory and group theory not generally covered in cryptography books.
  • Lawrence C. Washington – Elliptic Curves: Number Theory and Cryptography ISBN 1-58488-365-0. A book focusing on elliptic curves, beginning at an undergraduate level (at least for those who have had a course on abstract algebra), and progressing into much more advanced topics, even at the end touching on Andrew Wiles' proof of the Taniyama–Shimura conjecture which led to the proof of Fermat's last theorem.
  • Christof Paar and Jan Pelzl – Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2009, ISBN 978-3-642-04100-6 (companion website includes 2 semesters of video lectures, slides and sample book chapters). Very accessible introduction to applied cryptography which covers most schemes of practical relevance. The focus is on being a textbook, i.e., it has pedagogical approach, many problems and further reading sections. The main target audience are readers without a background in pure mathematics.
  • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone – Handbook of Applied Cryptography ISBN 0-8493-8523-7 (online version). Equivalent to Applied Cryptography in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as crypto system design. This is currently (2004) regarded as the standard reference work in technical cryptography.
  • Ferguson, Niels, and Schneier, Bruce – Practical Cryptography, Wiley, 2003, ISBN 0-471-22357-3. A cryptosystem design consideration primer. Covers both algorithms and protocols. This is an in depth consideration of one cryptographic problem, including paths not taken and some reasons why. At the time of its publication, most of the material was not otherwise available in a single source. Some was not otherwise available at all. According to the authors, it is (in some sense) a follow-up to Applied Cryptography.
  • Schneier, Bruce – Applied Cryptography, 2 ed, Wiley, 1996, (ISBN 0-471-11709-9). The most accessible single volume available covering modern cryptographic practice, and approachable by the non mathematically oriented. Extensive bibliography which can serve as an entry into the modern literature. It is a great book for beginners but note that it is getting a bit dated—many important schemes such as AES or the eSTREAM candidates are missing entirely, others like elliptic curves are only very briefly treated. Less immediately mathematical than some others, e.g. Menezes et al. Handbook of Applied Cryptography.
  • Mel, H.X., and Baker, Doris – Cryptography Decrypted, Addison Wesley 2001, ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including extensive diagrams and graphics) explains the evolution of cryptography from the simplest concepts to some modern concepts. It details the basics of symmetric key, and asymmetric key ciphers, MACs, SSL, secure mail and IPsec. No math background is required, though there's some public key mathematics in the appendix.
  • Candela, Rosario, The Military Cipher of Commandant Bazeries. New York: Cardanus Press, 1938. This book detailed cracking of a famous code from 1898 created by Commandant Bazeries, a brilliant French Army Cryptanalyst.

Read more about this topic:  Books On Cryptography

Famous quotes containing the word list:

    My list of things I never pictured myself saying when I pictured myself as a parent has grown over the years.
    Polly Berrien Berends (20th century)

    We saw the machinery where murderers are now executed. Seven have been executed. The plan is better than the old one. It is quietly done. Only a few, at the most about thirty or forty, can witness [an execution]. It excites nobody outside of the list permitted to attend. I think the time for capital punishment has passed. I would abolish it. But while it lasts this is the best mode.
    Rutherford Birchard Hayes (1822–1893)

    Modern tourist guides have helped raised tourist expectations. And they have provided the natives—from Kaiser Wilhelm down to the villagers of Chichacestenango—with a detailed and itemized list of what is expected of them and when. These are the up-to- date scripts for actors on the tourists’ stage.
    Daniel J. Boorstin (b. 1914)