**List**

Significant books on cryptography include:

- Gaines, Helen Fouché –
*Cryptanalysis*, 1939, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. It reflects public amateur practice as of the inter-War period. The book was compiled as one of the first projects of the American Cryptogram Association. - Dominic Welsh –
*Codes and Cryptography*, Oxford University Press, 1988. A brief textbook intended for undergraduates. Some coverage of fundamental information theory. Requires some mathematical maturity; is well written, and otherwise accessible. - Patterson, Wayne (1987).
*Mathematical Cryptology for Computer Scientists and Mathematicians*, Rowman & Littlefield, ISBN 0-8476-7438-X - Konheim, Alan G. (1981).
*Cryptography: A Primer*, John Wiley & Sons, ISBN 0-471-08132-9. Written by one of the IBM team who developed DES. - Jonathan Katz and Yehuda Lindell's
*Introduction to Modern Cryptography*, CRC Press. Presents modern cryptography at a level appropriate for undergraduates, graduate students, or practitioners. Assumes mathematical maturity but presents all the necessary mathematical and computer science background. - Mao, Wenbo (2004).
*Modern Cryptography Theory and Practice*ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind. - Douglas Stinson –
*Cryptography: Theory and Practice*ISBN 1-58488-508-4. Covers topics in a textbook style but with more mathematical detail than is usual. - Nigel Smart –
*Cryptography: An introduction*ISBN 0-07-709987-7 (online version). Similar in intent to*Applied Cryptography*but less comprehensive. Covers more modern material and is aimed at undergraduates covering topics such as number theory and group theory not generally covered in cryptography books. - Lawrence C. Washington –
*Elliptic Curves: Number Theory and Cryptography*ISBN 1-58488-365-0. A book focusing on elliptic curves, beginning at an undergraduate level (at least for those who have had a course on abstract algebra), and progressing into much more advanced topics, even at the end touching on Andrew Wiles' proof of the Taniyama–Shimura conjecture which led to the proof of Fermat's last theorem. - Christof Paar and Jan Pelzl –
*Understanding Cryptography: A Textbook for Students and Practitioners*, Springer, 2009, ISBN 978-3-642-04100-6 (companion website includes 2 semesters of video lectures, slides and sample book chapters). Very accessible introduction to applied cryptography which covers most schemes of practical relevance. The focus is on being a textbook, i.e., it has pedagogical approach, many problems and further reading sections. The main target audience are readers without a background in pure mathematics. - A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone –
*Handbook of Applied Cryptography*ISBN 0-8493-8523-7 (online version). Equivalent to*Applied Cryptography*in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as crypto system design. This is currently (2004) regarded as the standard reference work in technical cryptography. - Ferguson, Niels, and Schneier, Bruce –
*Practical Cryptography*, Wiley, 2003, ISBN 0-471-22357-3. A cryptosystem design consideration primer. Covers both algorithms and protocols. This is an in depth consideration of one cryptographic problem, including paths not taken and some reasons why. At the time of its publication, most of the material was not otherwise available in a single source. Some was not otherwise available at all. According to the authors, it is (in some sense) a follow-up to*Applied Cryptography*. - Schneier, Bruce –
*Applied Cryptography*, 2 ed, Wiley, 1996, (ISBN 0-471-11709-9). The most accessible single volume available covering modern cryptographic practice, and approachable by the non mathematically oriented. Extensive bibliography which can serve as an entry into the modern literature. It is a great book for beginners but note that it is getting a bit dated—many important schemes such as AES or the eSTREAM candidates are missing entirely, others like elliptic curves are only very briefly treated. Less immediately mathematical than some others, e.g. Menezes et al.*Handbook of Applied Cryptography*. - Mel, H.X., and Baker, Doris –
*Cryptography Decrypted*, Addison Wesley 2001, ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including extensive diagrams and graphics) explains the evolution of cryptography from the simplest concepts to some modern concepts. It details the basics of symmetric key, and asymmetric key ciphers, MACs, SSL, secure mail and IPsec. No math background is required, though there's some public key mathematics in the appendix. - Candela, Rosario,
*The Military Cipher of Commandant Bazeries*. New York: Cardanus Press, 1938. This book detailed cracking of a famous code from 1898 created by Commandant Bazeries, a brilliant French Army Cryptanalyst.

Read more about this topic: Books On Cryptography

### Other articles related to "lists, list":

... Marge has been ranked highly in

**lists**of the top television mothers of all time ... She was ranked first on Entertainment Weekly's

**list**in 1994 first on Fox News'

**list**in 2005 eighth on CityNews'

**list**in 2008 and was included in Time's

**list**of ... In May 2012, Marge was one of the 12 moms chosen by users of iVillage on their

**list**of "Mommy Dearest The TV Moms You Love" ...

1 in BusinessWeek's annual

**list**of Best Places To Launch a Career for 2008. 44 in the Fortune

**list**of 100 Best Companies to Work For, and the highest among the Big Four, for 2009 ... Universum's America's Ideal Employers

**list**2011 and 3rd in its Global Top Employers

**list**...

... in this family can be viewed on the following three pages

**List**of Mimosoideae genera

**List**of Caesalpinioideae genera

**List**of Faboideae genera ...

... League of Communists of Yugoslavia President of Bosnia and Herzegovina

**List**of Prime Ministers of Bosnia and Herzegovina

**List**of heads of state of Yugoslavia

**List**of Prime Ministers of Yugoslavia Politics of ...

**List**Of Sculptors

... This is a

**list**of sculptors - notable people who are known for their three-dimensional artistic creations (this can include artists who use sound and light) ... This

**list**is incomplete ...

### Famous quotes containing the word list:

“We saw the machinery where murderers are now executed. Seven have been executed. The plan is better than the old one. It is quietly done. Only a few, at the most about thirty or forty, can witness [an execution]. It excites nobody outside of the *list* permitted to attend. I think the time for capital punishment has passed. I would abolish it. But while it lasts this is the best mode.”

—Rutherford Birchard Hayes (1822–1893)

“Weigh what loss your honor may sustain

If with too credent ear you *list* his songs,

Or lose your heart, or your chaste treasure open

To his unmastered importunity.”

—William Shakespeare (1564–1616)

“Lastly, his tomb

Shall *list* and founder in the troughs of grass

And none shall speak his name.”

—Karl Shapiro (b. 1913)