Cryptography
Suggested Readings
Recommended Text Books
Primary
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.
Handbook of Applied
Cryptography.
CRC Press, 1996.
Bruce Schneier,
Applied Cryptography
,
Wiley, 1996.
Jennifer Seberry and Josed Pieprzyk.
Cryptography: An Introduction to Computer Security
Prentice-Hall, 1989.
Douglas R. Stinson.
Cryptography: Theory and Practice.
CRC Press, 1995.
Other
G. Brassard, Modern Cryptology: a tutorial. Spinger-Verlag, 1988.
N. Koblitz, A course in number theory and cryptography.
Springer-Verlag, 1987.
C. Pfleeger, Security in Computing. Prentice-Hall, 1989.
A. Saloma, Public-key cryptography. Springer-Verlag, 1990.
D. Welsh, Codes and Cryptography. Claredon Press, 1988.
Further Readings and Links
General links
Ron Rivest's Cryptography and Security Page
Bruce Schneier's Crypto Links
The International Cryptography page.
Quadralay's
Cryptography Archive
Cryptography: The Study of Encryption (another archive).
Cryptography FAQ (from sci.crypt)
Cryptography FAQ (from RSA Data Security, Inc. ).
Companies
Survery articles
T. Beth.
Algorithm engineering for public key algorithms.
IEEE Selected Areas of Communication, 1(4), 458--466, 1990.
E. F. Brickell and A. M. Odlyzko.
Cryptanalysis: A survey of Recent Results.
Proceedings of the IEEE, 76(5), 578--593, 1988.
W. Diffie.
The first ten years of public key cryptography.
IEEE proceedings, 76(5), 560--577, 1988.
J. Massey.
An introduction to contemporary cryptology.
IEEE proceedings, 76(5), 533--549, 1988.
Simmons (ed.).
Contemporary Cryptology: the Science of Information Integrity.
IEEE press, 1991.
R. L. Rivest.
"Cryptology" in Handbook of Theoretical Computer Science, vol. A:
Algorithms and Complexity, Elsevier and MIT Press (1990), 717-756.
Digital cash.
Millicent page.
List of
propose protocols.
DES and other Block Ciphers.
Bruce Schneier,
Applied Cryptography,
Wiley, 1995.
Chapter 12, 13 and 14.
The Block Cipher
Lounge lists the performance and weaknesses of various block
ciphers.
KERBEROS.
J. T. Kohl.
The evolution of the KERBEROS authentication service.
(abstract).
Key Escrow Systems
A taxonomy and list of key escrow encryption systems.
The Politics of Encryption
What's HOT in Encryption
Back to the topics list.