Cryptographers' World
 

Cryptography Books


 
Antoine JouxAlgorithmic Cryptanalysis. Chapman & Hall / CRC, 2009. ISBN 978-1-420-07002-6.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[No citation]



 
Victor ShoupA Computational Introduction to Number Theory and Algebra. Cambridge University Press, 2009. ISBN 978-0-521-51644-0.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 124 times Red StarRed Star]



 
Lawrence WashingtonElliptic Curves: Number Theory and Cryptography. Chapman & Hall / CRC, 2008. ISBN 978-1-420-07146-7.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 183 times Red StarRed Star]



 
Jeffrey HoffsteinJill PipherJoseph H. SilvermanAn Introduction to Mathematical Cryptography. Springer, 2008. ISBN 978-0-387-77993-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[No citation]



 
Song Y. YanCryptanalytic Attacks on RSA. Springer, 2008. ISBN 978-0-387-48741-0.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 1 times ]



 
Jonathan KatzYehuda LindellIntroduction to Modern Cryptography: Principles and Protocols. Chapman & Hall / CRC, 2007. ISBN 978-1-584-88551-1.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 19 times ]



 
Alexander A. MoldovyanNick A. MoldovyanData-driven Block Ciphers for Fast Telecommunication Systems. Chapman & Hall / CRC, 2007. ISBN 978-1-420-05411-8.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[No citation]



 
Stefan MangardElisabeth OswaldThomas PoppPower Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007. ISBN 978-0-387-30857-9.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 68 times Red Star]



 
Hans DelfsHelmut KneblIntroduction to Cryptography - Principles and Applications. Springer, 2007. ISBN 978-3-540-49243-6.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 85 times Red Star]



 
Oded GoldreichFoundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, 2007. ISBN 978-0-521-03536-1.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 1001 times Red StarRed StarRed StarRed StarRed Star]



 
Richard A. MollinAn Introduction to Cryptography. Chapman & Hall / CRC, 2006. ISBN 978-1-584-88618-1.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 76 times Red Star]



 
Alon RosenConcurrent Zero-Knowledge. Springer, 2006. ISBN 978-3-540-32938-1.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 1 times ]



 
Jörg RotheComplexity Theory and Cryptology. Springer, 2005. ISBN 978-3-540-22147-0.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 20 times ]



 
Thomas BaignèresPascal JunodYi LuJean MonneratSerge VaudenayA Classical Introduction to Cryptography - Exercise Book. Springer, 2005. ISBN 978-0-387-27934-3.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 3 times ]



 
Serge VaudenayA Classical Introduction to Cryptography: Applications for Communications Security. Springer, 2005. ISBN 978-0387254647.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 19 times ]



 
Henk C. A. van TilborgEncyclopedia of Cryptography and Security. Springer, 2005. ISBN 978-0-387-23473-1.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 23 times ]



 
Henri CohenGerhard FreyRoberto Maria AvanziChristophe DocheTanja LangeKim NguyenFrederik VercauterenHandbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall / CRC, 2005. ISBN 978-1584885184.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 173 times Red StarRed Star]



 
Douglas R. StinsonCryptography: Theory and Practice. Chapman & Hall / CRC, 2005. ISBN 978-1-584-88508-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 2078 times Red StarRed StarRed StarRed StarRed Star]



 
Fred PiperSean MurphyCryptography: A Very Short Introduction. Oxford University Press, 2005. ISBN 978-0-192-80315-3.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 22 times ]



 
Richard A. MollinCodes: The Guide to Secrecy From Ancient to Modern Times . Chapman & Hall / CRC, 2005. ISBN 978-1-584-88470-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 8 times ]



 
Johannes BuchmannIntroduction to Cryptography. Springer, 2004. ISBN 978-0-387-21156-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 121 times Red StarRed Star]



 
Oded GoldreichFoundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004. ISBN 978-0-521-83084-3.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 1001 times Red StarRed StarRed StarRed StarRed Star]



 
Adam YoungMoti YungMalicious Cryptography: Exposing Cryptovirology. Wiley, 2004. ISBN 978-0-764-54975-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 38 times ]



 
Darrel HankersonAlfred MenezesScott A. VanstoneGuide to Elliptic Curve Cryptography. Springer, 2004. ISBN 978-0-387-95273-4.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 503 times Red StarRed StarRed StarRed Star]



 
Colin BoydAnish MathuriaProtocols for Authentication and Key Establishment. Springer, 2003. ISBN 978-3-540-43107-7.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 219 times Red StarRed Star]



 
Niels FergusonBruce SchneierPractical Cryptography. Wiley, 2003. ISBN 978-0-471-22357-3.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 295 times Red StarRed StarRed Star]



 
Josef PieprzykThomas HardjonoJennifer SeberryFundamentals of Computer Security. Springer, 2003. ISBN 978-3-540-43101-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 101 times Red StarRed Star]



 
Wenbo MaoModern Cryptography: Theory and Practice. Prentice Hall PTR, 2003. ISBN 978-0-130-66943-8.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 229 times Red StarRed Star]



 
Richard A. MollinRSA and Public-Key Cryptography . Chapman & Hall / CRC, 2002. ISBN 978-1-584-88338-8.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 12 times ]



 
Samuel S. WagstaffCryptanalysis of Number Theoretic Ciphers . Chapman & Hall / CRC, 2002. ISBN 978-1-584-88153-7.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 32 times ]



 
Joan DaemenVincent RijmenThe Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002. ISBN 978-3-540-42580-9.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 37 times ]



 
Oded GoldreichModern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer, 1998. ISBN 978-3-540-64766-9.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 175 times Red StarRed Star]



 
Arto SalomaaPublic-Key Cryptography. Springer, 1996. ISBN 978-3-540-61356-5.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 201 times Red StarRed Star]



 
Alfred MenezesPaul C. van OorschotScott A. VanstoneHandbook of Applied Cryptography. Chapman & Hall / CRC, 1996. ISBN 978-0-849-38523-0.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 6496 times Red StarRed StarRed StarRed StarRed StarRed Star]



 
Bruce SchneierApplied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 1996. ISBN 978-0-471-11709-4.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 7223 times Red StarRed StarRed StarRed StarRed StarRed Star]





Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...