Significant books on cryptography include:
- Gaines, Helen Fouché – Cryptanalysis, 1939, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. It reflects public amateur practice as of the inter-War period. The book was compiled as one of the first projects of the American Cryptogram Association.
- Dominic Welsh – Codes and Cryptography, Oxford University Press, 1988. A brief textbook intended for undergraduates. Some coverage of fundamental information theory. Requires some mathematical maturity; is well written, and otherwise accessible.
- Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
- Konheim, Alan G. (1981). Cryptography: A Primer, John Wiley & Sons, ISBN 0-471-08132-9. Written by one of the IBM team who developed DES.
- Jonathan Katz and Yehuda Lindell's Introduction to Modern Cryptography, CRC Press. Presents modern cryptography at a level appropriate for undergraduates, graduate students, or practitioners. Assumes mathematical maturity but presents all the necessary mathematical and computer science background.
- Mao, Wenbo (2004).Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind.
- Douglas Stinson – Cryptography: Theory and Practice ISBN 1-58488-508-4. Covers topics in a textbook style but with more mathematical detail than is usual.
- Nigel Smart – Cryptography: An introduction ISBN 0-07-709987-7 (online version). Similar in intent to Applied Cryptography but less comprehensive. Covers more modern material and is aimed at undergraduates covering topics such as number theory and group theory not generally covered in cryptography books.
- Lawrence C. Washington – Elliptic Curves: Number Theory and Cryptography ISBN 1-58488-365-0. A book focusing on elliptic curves, beginning at an undergraduate level (at least for those who have had a course on abstract algebra), and progressing into much more advanced topics, even at the end touching on Andrew Wiles' proof of the Taniyama–Shimura conjecture which led to the proof of Fermat's last theorem.
- Christof Paar and Jan Pelzl – Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2009, ISBN 978-3-642-04100-6 (companion website includes 2 semesters of video lectures, slides and sample book chapters). Very accessible introduction to applied cryptography which covers most schemes of practical relevance. The focus is on being a textbook, i.e., it has pedagogical approach, many problems and further reading sections. The main target audience are readers without a background in pure mathematics.
- A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone – Handbook of Applied Cryptography ISBN 0-8493-8523-7 (online version). Equivalent to Applied Cryptography in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as crypto system design. This is currently (2004) regarded as the standard reference work in technical cryptography.
- Ferguson, Niels, and Schneier, Bruce – Practical Cryptography, Wiley, 2003, ISBN 0-471-22357-3. A cryptosystem design consideration primer. Covers both algorithms and protocols. This is an in depth consideration of one cryptographic problem, including paths not taken and some reasons why. At the time of its publication, most of the material was not otherwise available in a single source. Some was not otherwise available at all. According to the authors, it is (in some sense) a follow-up to Applied Cryptography.
- Schneier, Bruce – Applied Cryptography, 2 ed, Wiley, 1996, (ISBN 0-471-11709-9). The most accessible single volume available covering modern cryptographic practice, and approachable by the non mathematically oriented. Extensive bibliography which can serve as an entry into the modern literature. It is a great book for beginners but note that it is getting a bit dated—many important schemes such as AES or the eSTREAM candidates are missing entirely, others like elliptic curves are only very briefly treated. Less immediately mathematical than some others, e.g. Menezes et al. Handbook of Applied Cryptography.
- Mel, H.X., and Baker, Doris – Cryptography Decrypted, Addison Wesley 2001, ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including extensive diagrams and graphics) explains the evolution of cryptography from the simplest concepts to some modern concepts. It details the basics of symmetric key, and asymmetric key ciphers, MACs, SSL, secure mail and IPsec. No math background is required, though there's some public key mathematics in the appendix.
- Candela, Rosario, The Military Cipher of Commandant Bazeries. New York: Cardanus Press, 1938. This book detailed cracking of a famous code from 1898 created by Commandant Bazeries, a brilliant French Army Cryptanalyst.
Read more about this topic: Books On Cryptography
Other articles related to "lists, list":
... Marge has been ranked highly in lists of the top television mothers of all time ... She was ranked first on Entertainment Weekly's list in 1994 first on Fox News' list in 2005 eighth on CityNews' list in 2008 and was included in Time's list of ... In May 2012, Marge was one of the 12 moms chosen by users of iVillage on their list of "Mommy Dearest The TV Moms You Love" ...
1 in BusinessWeek's annual list of Best Places To Launch a Career for 2008. 44 in the Fortune list of 100 Best Companies to Work For, and the highest among the Big Four, for 2009 ... Universum's America's Ideal Employers list 2011 and 3rd in its Global Top Employers list ...
... in this family can be viewed on the following three pages List of Mimosoideae genera List of Caesalpinioideae genera List of Faboideae genera ...
... League of Communists of Yugoslavia President of Bosnia and Herzegovina List of Prime Ministers of Bosnia and Herzegovina List of heads of state of Yugoslavia List of Prime Ministers of Yugoslavia Politics of ...
... This is a list of sculptors - notable people who are known for their three-dimensional artistic creations (this can include artists who use sound and light) ... This list is incomplete ...
Famous quotes containing the word list:
“We saw the machinery where murderers are now executed. Seven have been executed. The plan is better than the old one. It is quietly done. Only a few, at the most about thirty or forty, can witness [an execution]. It excites nobody outside of the list permitted to attend. I think the time for capital punishment has passed. I would abolish it. But while it lasts this is the best mode.”
—Rutherford Birchard Hayes (18221893)
“Weigh what loss your honor may sustain
If with too credent ear you list his songs,
Or lose your heart, or your chaste treasure open
To his unmastered importunity.”
—William Shakespeare (15641616)
“Lastly, his tomb
Shall list and founder in the troughs of grass
And none shall speak his name.”
—Karl Shapiro (b. 1913)