Cryptography


Suggested Readings

  • Introduction to Cryptography. A good online intro with several useful links.
  • Bruce Schneier, Applied Cryptography , Wiley, 1996.
  • Chapter 19 (Public Key Algorithms)
  • Chapter 24 (Example Implementations)
  • Recommended Text Books

    Primary
  • Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
  • Bruce Schneier, Applied Cryptography , Wiley, 1996.
  • Jennifer Seberry and Josed Pieprzyk. Cryptography: An Introduction to Computer Security Prentice-Hall, 1989.
  • Douglas R. Stinson. Cryptography: Theory and Practice. CRC Press, 1995.
  • Other
  • G. Brassard, Modern Cryptology: a tutorial. Spinger-Verlag, 1988.
  • N. Koblitz, A course in number theory and cryptography. Springer-Verlag, 1987.
  • C. Pfleeger, Security in Computing. Prentice-Hall, 1989.
  • A. Saloma, Public-key cryptography. Springer-Verlag, 1990.
  • D. Welsh, Codes and Cryptography. Claredon Press, 1988.
  • Further Readings and Links

  • General links
  • Ron Rivest's Cryptography and Security Page
  • Bruce Schneier's Crypto Links
  • The International Cryptography page.
  • Quadralay's Cryptography Archive
  • Cryptography: The Study of Encryption (another archive).
  • Cryptography FAQ (from sci.crypt)
  • Cryptography FAQ (from RSA Data Security, Inc. ).
  • Companies
  • Survery articles
  • T. Beth. Algorithm engineering for public key algorithms. IEEE Selected Areas of Communication, 1(4), 458--466, 1990.
  • E. F. Brickell and A. M. Odlyzko. Cryptanalysis: A survey of Recent Results. Proceedings of the IEEE, 76(5), 578--593, 1988.
  • W. Diffie. The first ten years of public key cryptography. IEEE proceedings, 76(5), 560--577, 1988.
  • J. Massey. An introduction to contemporary cryptology. IEEE proceedings, 76(5), 533--549, 1988.
  • Simmons (ed.). Contemporary Cryptology: the Science of Information Integrity. IEEE press, 1991.
  • R. L. Rivest. "Cryptology" in Handbook of Theoretical Computer Science, vol. A: Algorithms and Complexity, Elsevier and MIT Press (1990), 717-756.
  • Digital cash.
  • Millicent page.
  • List of propose protocols.
  • DES and other Block Ciphers.
  • Bruce Schneier, Applied Cryptography, Wiley, 1995. Chapter 12, 13 and 14.
  • The Block Cipher Lounge lists the performance and weaknesses of various block ciphers.
  • KERBEROS.
  • J. T. Kohl. The evolution of the KERBEROS authentication service. (abstract).
  • Key Escrow Systems
  • A taxonomy and list of key escrow encryption systems.
  • The Politics of Encryption
  • What's HOT in Encryption

  • Back to the topics list.