References
Popular Books
- Bamford, James, Puzzle Palace. Anchor Books.
Amazon.
- Bamford, James, Body of Secrets. Anchor Books.
Amazon.
- Budiansky, Stephen, “Battle of Wits”.
Amazon.
- Copeland B. Jack, “Colossus”.
Amazon.
- Hodges, Andrew, Alan Turing: The Enigma.
Amazon.
- Kahn, David, Codebreakers, Macmillian, 1966.
Highly recommended.
Amazon.
- Welchman, Gordon “The Hut Six Story”, McGraw-Hill, 1982.
Amazon.
Books
- Aho, Hopcroft, Ullman, The Design and Analysis of Computer Algorithms.
Addison-Wesley.
Amazon.
- Anderson, Ross, Security Engineering by Ross Anderson.
Available online at Author's Web Site.
- Apostol, Tom, Introduction to Analytic Number Theory. Springer.
Amazon.
- Blake, Seroussi, and Smart, Elliptic Curves in Cryptography, Cambridge
Amazon.
- Bressoud and Wagon, Computational Number Theory. Key Press.
Amazon.
- Bach and Shallit, Algorithmic Number Theory.
Amazon.
- Berlekamp, Algebraic Coding Theory. Reprinted by Aegean Park Press.
Amazon.
- Biham and Shamir, Differential Cryptanalysis of DES. Springer.
Amazon.
- Buchmann, Johannes, Introduction to Cryptography. Springer, 1999.
Amazon.
- Burnside, The Theory of Groups of Finite Order. Dover.
Amazon.
- Churchhouse, Codes and Ciphers. Cambridge, 2002.
Amazon.
- Cid, Murphy and Robshaw,
Algebraic Apsects of the Advanced Encryption Standard, Springer, 2006.
Amazon.
- Cohen, A Course in Computational Algebraic Number Theory. Springer.
Amazon.
- Courant and Robbins, "What is Mathematics?", Oxford.
OK, this is not really a crypto book. No one should be without it though.
Amazon.
- Cox, Little, O'Shea, Ideals, Varieties, and Algorithms. Springer-Verlag, 1997.
Amazon.
- Cox, Little, O'Shea, Using Algebraic Geometry. Springer-Verlag, 1998.
Amazon.
- Daemen and Rimjen, The Design of Rijndael. Springer, 2002.
Highly recommended.
Amazon.
- Deavours et al., “Cryptology: Machines, History & Methods”, Artech House, 1989.
Amazon.
- Diaconis, Persi, Group Representations in Probability and Statistics, Springer, 1988. (Hard
to get.) Amazon.
- Ferguson and Schneier, Practical Cryptography. Wiley, 2004.
Amazon.
- Friedman, Riverbank Publications. Get any you can, especially
"The Index of Coincidence."
Index of Coincidence.
- Friedman, Military Cryptanalysis.
NSA.
- Garey and Johnson, Computers and Intractibility.
Amazon.
- Garrett, The Mathematics of Coding Theory. Prentice Hall.
Amazon.
- Gollmann, Dieter, Computer Security (2nd Edition). Wiley.
Amazon.
- Golomb, Shift Register Sequences.
Amazon.
- Hankerson et al. Elliptic Curve Cryptography. Springer, 2004.
Amazon.
- Herstein, I.N., Topics in Algebra. Xerox publishing.
Amazon.
- Hoffman,and Kunze, Linear Algebra. Prentice Hall.
Amazon.
- Ireland and Rosen, A Classical Introduction to Modern Number Theory. Springer.
Amazon.
- Jacobson, N, Basic Algebra I. Freedman.
Amazon.
- Jacobson, N, Lectures in Algebra (I, II, III). Springer.
Amazon.
- James, Liebeck, Representation Theory of Finite Groups.
Cambridge University Press.
Very readable introduction.
Amazon.
- Knuth, Art of Computer Programming, all volumes, fascicles, etc.
Addison-Wesley.
Preprints.
- Koblitz, A Course in Number Theory and Cryptography. Springer.
Amazon.
- Koblitz, Algebraic Aspects of Cryptography. Springer.
Amazon.
- Konheim, Cryptography: A Primer. Wiley, 1981.
Amazon.
- Konheim, Computer Security and Cryptography. Wiley, 2007.
Amazon.
- Korner, Pleasures of Counting. Cambridge, 2001.
Amazon.
- Kullback, Statistical Methods in Cryptanalysis. ASA, 1938.
Amazon.
- Lang, Algebra. Springer.
Amazon.
- Lang, Algebric Number Theory. Springer.
Amazon.
- Leveque, Fundamentals of Number Theory. Dover.
Amazon.
- Liebler, Basic Matrix Algebra with Algorithms and Applications. Chapman-Hall.
Amazon.
- MacWilliams and Sloane, Theory of Error Correcting Codes.
North Holland.
Highly recommended.
Amazon.
- Marcus, Algebraic Number Theory. Springer.
Amazon.
- McCurley et al., Advances in Cryptology, 1981-1995. Springer.
Amazon.
- McEliece, The Theory of Information and Coding. Addison Wesley.
Amazon.
- Menezes, van Oorshot, Vanstone, Handbook of Applied Cryptography.
CRC Press.
Author's web site.
- Meyer and Matyas, Cryptography. Wiley, 1982.
Amazon.
- Mollin, Codes. Chapman, 2005.
Amazon.
- Niven, Zuckerman, Montgomery, An Introduction to the Theory of Numbers, Wiley.
Amazon.
- Rotman, The Theory of Groups. Springer.
Amazon.
- Rueppel, Analysis and Design of Stream Ciphers. Springer, 1986.
Amazon.
- Selmer, Linear Recurrence Relations over Finite Fields, University of Norway, 1966.
This is very hard to get.
- Schneier, Applied Cryptography. Wiley.
Amazon.
- Schneier et. al, TwoFish Encryption Algorithm. Wiley.
Amazon.
- Shannon, Mathematical Theory of Communication. BTSJ.
Online.
- Shannon, Communication Security of Secrecy Systems. BTSJ.
Online.
- Silverman, Joseph H. and John Tate, Rational Points on Elliptic Curves.
Springer.
Highly recommended. In fact, if Silverman writes a book, just buy it.
Amazon.
- Silverman, Joseph H., A friendly introduction to Number Theory.
Pretice Hall.
Highly recommended.
Amazon.
- Silverman, Joseph H., Elliptic Curves.
Springer.
Highly recommended.
Amazon.
- Simovits, The DES: Documentation and Evaluation. Aegean Park Press.
Amazon.
- Sinkov, Elementary Cryptanalysis. MAA, 1966.
Amazon.
- Smart, Nigel, Cryptography: An Introduction.
Author's Web Site.
- Stamp, Information Security. Wiley, 2005.
Amazon.
- Stamp and Low, Applied Cryptanalysis. Wiley, 2007.
Amazon.
- Stinson, Cryptography: Theory and Practice. CRC Press.
Amazon.
- Stein, William, Basic Number Theory.
There's quite a lot of good stuff on
Stein's site.
William Stein's Web Site.
- Trappe and Washington, Introduction to Cryptography and Coding Theory.
Pearson/Prentice-Hall.
Highly recommended.
Amazon.
- US Army: Basic Cryptanalysis.
Web Site.
- vander Waerden, Algebra volume 1, 2.
My favorite book in the world, bar none. Eighty years old and still nearly perfect.
Amazon.
- Vaudenay, Introduction to Classical Cryptography. Springer.
Amazon.
- Washington, Elliptic Curves: Number Theory and Cryptography. Chapman and Hall.
Very highly recommended.
Amazon.
- Welch, Dominic, Codes and Cryptography. Oxford.
Amazon.
Standards
-
ANS X9.82, Random Number Generation Part 2: Entropy Sources.
- Advanced Encryption Standard.
NIST Standard.
- Data Encryption Standard.
NIST Standard.
- Recommendation for Random Number Generation Using Deterministic Random Bit Generators.
NIST Standard.
- Secure Hash Standard.
NIST Draft.
Thesis and online
Courses
-
Benaloh, LaMacchia, Manferdelli, Lecture Notes for CSE 590, 2005.
Index of courses.
-
Rivest, Class notes on Security and Crypto online.
Ron.
Papers and Surveys
- Biham and Shamir, Differential Cryptanalysis of DES. Paper.
Authors Web Site.
- Heys, Linear/Differential Cryptanalysis Tutorial.
Authors Web Site.
- Matsui, Linear Cryptanalysis Method for DES cipher.
Course Web Site.
- Boneh, Twenty Years of attacks on RSA. Notices AMS.
AMS Web Site.
-
Landau, Susan,
Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard.
Author's Web Site.
-
Deavours, Methods la Batons. Cryptologia.
-
Rejewski, “Mathematical Solution of Enigma Cipher”, Cryptologia, vol. 6, No. 1, pp. 1-18.
-
Reeds, Rotor Algebra. Cryptologia.
Websites