Books on Cryptography .
Mathematics and Cryptography
7026: Algebra for Cryptologists A. R. Meijer, Springer; Edición: 1st ed. 2016 (2 de septiembre de 2016). |
|
7025: Boolean Functions and Their Applications in Cryptography C.K. Wu, D. Feng, Springer 2016. |
|
7024: Homomorphic Encryption and Applications X. Yi, R. Paulet, E. Bertino, Springer 2014. |
|
7023: Open Problems in Mathematics and Computational Science K. Koç , Springer 2014. |
|
7022: Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. M. Fischlin, S. Katzenbeisser, Springer 2013. |
|
7021: Algebraic Curves in Cryptography S. Ling, H. Wang, C. Xing, CRC Press 2013. |
|
7020: An Introduction to Number Theory with Cryptography J. S. Kraft, L. C. Washington, Chapman and Hall/CRC, 2013. |
|
7019: Computational Number Theory and Modern Cryptography S. Y. Yan, Wiley 2013. |
|
7018: Mathematics of Public Key Cryptography S. D. Galbraith, Cambridge University Press 2012. |
|
7017: Identity-Based Encryption S. Chatterjee, P. Sakar, Springer 2011. |
|
7016: Chaos Based Cryptography L. Kocarev, S. Lian, Springer, 2011. |
|
7015: Gröbner Bases, Coding and Cryptography M. Sala, T. Mora, L. Perret, S. Sakata, C. Traverso, Springer, 2009. |
|
7014: Finite Automata and Application to Cryptography R. Tao, Springer, 2009. |
|
7013: Elementary Number Theory: Primes, Congruences, and Secrets W. Stein, Springer, 2009. |
|
7012: Algebraic Geometry in Coding Theory and Cryptography H. Niederreiter, C. Xing, Chapman and Hall/CRC, 2009. |
|
7011: Elliptic Curves: Number Theory and Cryptography L. C. Washigton, Springer, Chapman and Hall/CRC, 2008. |
|
7010: Identity-Based Cryptography M. Joye, G. Neven, IOS Press, 2008. |
|
7009: Introduction to Identity-Based Encryption L. Martin, Artech House, 2008. |
|
7008: Group-based Cryptography A. Myasnikov, V. Shpilrain, A. Ushakov,Birkhäuser , 2008. |
|
7007: Handbook of Elliptic and hyperelliptic Curve Cryptography H. Cohen, G. Frey, Chapman & Hall/CRC, 2006. |
|
7006: Algebraic Aspect of the Advanced Encryption Standard C. Cid, S. Murphy, M. Robshaw, Springer, 2006. |
|
7005: Advances in Elliptic Curve Cryptography I. Blake, G. Seroussi, N. Smart, Cambridge University Press, 2005. |
|
7004: Guide to Elliptic Curve Cryptography D. Hankerson, A. Menezes, S. Vanstone, Springer, 2004. |
|
7003: Elliptic Curves in Cryptography I. Blake, G. Seroussi, N. Smart, Cambridge University Press, 1999. |
|
7002: Algebraic Aspects of Cryptography N. Koblitz, Springer, 1999. |
|
7001: A Course in Number Theory and Cryptography N. Koblitz, Springer, 1994. |
|
7000: Elliptic Curve Public Key Cryptosystems A. J. Menezes , Springer; Edición: 1993 (31 de julio de 1993). |
General Cryptography
6018: Cryptography S. Rubinstein-Salzedo, Springer; Edición: 1st ed. 2018 (28 de septiembre de 2018). |
|
6017: The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday P.Y.A. Ryan, D. Naccache, J. Quisquater, Springer 2016. |
|
6016: Cryptography Made Simple N. P. Smart, Springer 2015. |
|
6015: Introduction to Modern Cryptography J. Katz, Y. Lindell, CRC Press 2014. |
|
6014: Introduction to Public Key Infrastructures J. A. Buchmann, E. Karatsiolis, A. Wiesmaier, Springer 2013. |
|
6013: Introduction to Cryptography with Maple J.L. Gómez Pardo, Springer 2013. |
|
6012: A Brief History of Cryptology and Cryptographic Algorithms J. F. Dooley, Springer 2013. |
|
6011: Understanding Cryptography C. Paar, J. Pelzl, Springer 2010. |
|
6010: An Introduction to Mathematical Cryptography J. Hoffstein, J. Pipher, J. H. Silverman, Springer, 2008. |
|
6009: Introduction to Cryptography H. Delfs, H. Knebl, Springer, 2007. |
|
6008: Computer Security and Cryptography A. G. Konheim, Wiley, 2007. |
|
6007: Classical Introduction To Cryptography Exercise Book T. Baignères, P. Junod, Y. Lu, J. Monnerat, S. Vaudenay, Sringer, 2006. |
|
6006: Cryptography, Theory and Practice D. R. Stinson, Chapman & Hall/CRC, 2006. |
|
6005: Cryptography and Introduction N. Smart, Mcgraw-Hill College, 2004. |
|
6004: User's Guide to Cryptography and Standards A. W. Dent, C. J. Mitchell, Artech House, 2005. |
|
6003: Encyclopedia of Cryptography and Security H. C. Tilborg, Springer, 2005. |
|
6002: Decrypted Secrets. Methods and Maxims of Cryptology F.L. Bauer, Springer, 1997. |
|
6001: Handbook of Applied Cryptography A.J. Menezes, P.C. van Oorschot, S. A. Vanstone, CRC Press, 1996. |
Fundamental and Theoretical Cryptography
5017: Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography) Y. Lindell (Editor), Springer; Edición: 1st ed. 2017 (6 de abril de 2017). |
|
5016: Cryptography in Constant Parallel Time B. Applebaum, Springer, 2014. |
|
5015: Operational Semantics and Verification of Security Protocols C. Cremers, S. Mauw, Springer, 2012. |
|
5014: Engineering Secure Two Party Computation Protocols T. Schneider, Springer, 2012. |
|
5013: Cryptographic Protocol L. Dong, K. Chen, Springer, 2012. |
|
5012: Black-Box Models of Computation in Cryptology T. Jager, Springer, 2012. |
|
5011: Efficient Secure Two-Party Protocols: Techniques and Constructions C. Hazay, Y. Lindell, Springer, 2010. |
|
5010: Introduction to Modern Cryptography J. Katz, Y. Lindell, Chapman & Hall/CRC, 2008. |
|
5009: Principles of Protocol Design R. Sharp, Springer, 2008. |
|
5008: Formal Correctness of Security Protocols G. Bella, Springer, 2007. |
|
5007: Concurrent Zero Knowledge A. Rosen, Springer, 2006. |
|
5006: Complexity and Cryptography, An Introduction J. Talbot, D. Welsh, Cambridge University Press, 2006. |
|
5005: Contemporary Cryptology D. Catalano, R. Cramer, I. Damgård, G. D. Crescenzo, D. Pointcheval, T. Takagi, Springer, 2005. |
|
5004: Complexity Theory and Cryptology. An Introduction to Cryptocomplexity J. Rothe , Springer, 2005. |
|
5003: Protocols for Authentication and Key Establishment C. Boyd, A. Mathuria, Springer, 2003. |
|
5002: Fundations of Cryptography O. Goldreich, Cambridge University Press, 2001. |
|
5001: Modern Cryptography, Probabilistic Proofs and Pseudorandomness O. Goldreich, Springer, 1999. |
Applied Cryptography
4035: Computation, Cryptography, and Network Security N. J. Daras, M. Rassias, Springer, 2015. |
|
4034: Guide to Security Assurance for Cloud Computing S.Y. Zhu, R.Hill, M. Trovati, Springer, 2015. |
|
4033: Understanding Bitcoin P. Franco, Wiley, 2015. |
|
4032: Cryptogrphy in Constant Parallel Time B. Applebaum, Springer, 2014. |
|
4031: Visual Cryptography for Image Processing and Security F. Liu, W.Q. Yan, Springer, 2014. |
|
4030: Secure Smart Embedded Devices, Platforms and Applications K. Markantonakis, K. Mayes, Springer, 2014. |
|
4029: Hardware Security: Design, Threats, and Safeguards D. Mukhopadlhyay, R. S. Chakraborty, CRC Press, 2014. |
|
4029: Algebraic Circuits A. Lloris, E. Castillo, L. Parrilla, A. García, Springer, 2014. |
|
4028: Security and Privacy in Social Networks Y. Altshuler, Y. Elovici, A. B. Cremers, N. Aharony, A. Pentland, Springer, 2013. |
|
4027: Security and Privacy in Mobile Social Networks X. Liang, R. Lu, X. Lin, X. Shen, Springer, 2013. |
|
4026: Security and Privacy in Biometrics P. Campisi, Springer, 2013. |
|
4025: Image Encryption: A Communication Perspective F. El-Samie, H. Ahmed, I. Elashry, M. Shahieen, O. Faragallah, E. El-Rabaie, S. Alshebeili, CRC Press, 2013. |
|
4024: Introduction to Hardware Security and Trust M. Tehranipoor, C. Wang, Springer, 2012. |
|
4023: Security for Wireless Sensor Networks using Identity-Based Cryptography H. K. Patil, S. A. Szygenda, CRC Press, 2012. |
|
4022: Visual Cryptography and Secret Image Sharing S. Cimato, C. Yang, CRC Press, 2012. |
|
4021: Securing Digital Video E. Diehl, Springer, 2012. |
|
4020: Security Trends for FPGAS B. Badrignans, J. Danger, V. Fischer, G. Gogniat, L. Torres, Springer, 2011. |
|
4019: Applied Cryptography for Cyber Security and Defense H. Nemati, L. Yang, Information Science Reference, 2011. |
|
4018: Implementing SSL/TLS J. Davies (Author), Wiley; Edición: 1 (11 de enero de 2011). |
|
4017: Towards Hardware-Intrinsic Security A. Sadeghi, D. Naccache, Springer, 2010. |
|
4016: Secure Integrated Circuits and Systems I. Verbauwhede, Springer, 2010. |
|
4015: Practical Signcryption A. W. Dent, Y. Zheng, Springer, 2010. |
|
4014: Digital Signatures J. Katz, Springer, 2010. |
|
4013: Securing Wireless Communications at the Physical Layer R. Liu, W. Trappe, Springer, 2010. |
|
4012: Security in Embedded Devices C. Gebotys, Springer, 2010. |
|
4011: Encryption for Digital Content A. Kiayias, S. Pehlivanoglu, Springer, 2010. |
|
4010: Cryptography Engineering, Design Principles and Practical Applications N. Ferguson, B. Schneier, T. Kohno, Wiley Publishing, 2010. |
|
4009: Cryptographic Engineering C. Kaya K., Springer, 2009. |
|
4008: Security Engineering for Vehicular IT Systems: Improving the Trustworthiness and Dependability of Automotive IT Applications M. Wolf, Vieweg+Teubner Verlag, 2009. |
|
4007: Understanding and Applying Cryptography and Data Security A. J. Elbirt, CRC Press, 2009. |
4006: Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security) J. A. Onieva (Author), J. Zhou (Author), Springer; Edición: 1st Edition. 2nd Printing. 2008 (2 de diciembre de 2008). |
4005: Networked RFID Systems and Lightweight Cryptography P.H. Cole, D. C. Ranasinghe, Springer, 2008. |
|
4004: Secure Systems Development with UML J. Jürjens, Springer, 2005. |
|
4003: Cryptographic Security Architecture P. Gutmann, Springer, 2004. |
|
4002: Internet Security, Cryptography principles, algorithms and protocols M. Y. Rhee, Wiley, 2003. |
|
4001: Network Security with OpenSSL J. Viega , M. Messier, P. Chandra , Wiley, 2003. |
Symetric Cryptography
3013: Security of Block Ciphers: From Algorithm Design to Hardware Implementation K. Sakiyama, Y. Sasaki, Y. Li Wiley, 2016. |
|
3012: The Hash Function BLAKE J. Aumasson, W. Meier, R. Phan, L. Henzen, Springer, 2014. |
|
3011: Symmetric Cryptographic Protocols M. Ramkumar (Author), Springer; Edición: Softcover reprint of the original 1st ed. 2014 (28 de octubre de 2016) |
|
3010: Stream Ciphers A. Klein, Springer, 2013. |
|
3009: A survey on Block Cipher Modes of Operation: their differences and possible applications A. Gabriel, LAP LAMBERT Academic Publishing, , 2012. |
|
3008: RC4 Stream Cipher and Its Variants G. Paul, S. Maitra, CRC Press, 2012. |
|
3007: Advanced Linear Cryptanalysis of Block and Stream Ciphers P.Junod , A. Canteaut, IOS Press, 2011. |
|
3006: The Block Cipher Companion L. R. Knudsen, M. Robshaw, IOS Press, 2011. |
|
3005: Hard Disk Encryption with Block Ciphers: Common Attacks and Modes of Operation T. Wenninger, VDM Verlag, 2010. |
|
3004: Novel Design of Block Cipher Cryptosystem: Analysis, Design and Implementation K. C. Leung, VDM Verlag, 2009. |
|
3003: New Stream Cipher Designs: The eSTREAM Finalists M. Robshaw, O. Billet, Springer, 2008. |
|
3002: Data-driven Block Ciphers for Fast Telecommunication Systems N. Moldovyan, A. Moldovyan, Auerbach Publication, 2007. |
|
3001: Algebraic Aspects of the Advanced Encryption Standard C. Cid, S. Murphy, M. Robshaw (Authors), Springer; Edición: 2006 (16 de agosto de 2006). |
|
3000: The Design of RijndaeL: AES - The Advanced Encryption Standard J. Daemen, V. Rijmen, Springer, 2002. |
Cryptanalysis
2012: Timing Channels in Cryptography: A Micro-Architectural Perspective C. Rabeiro, D. Mukhopadhyay, S. Bhattacharya, Springer, 2015. |
|
2011: Why Cryptography Should Not Rely on Physical Attack Complexity J. Krämer, Springer, 2015. |
|
2010: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits E. Peeters, Springer, 2013 . |
|
2009: Quantum Attacks on Public-Key Cryptosystems S. Y. Yan, Springer, 2013. |
|
2008: Faul Analysis in Cryptography M. Joye, M. Tunstall, Springer, 2012. |
|
2007: Advanced Statistical Steganalysis R. Böhme, CRC Press , 2010. |
|
2006: Power Analysis Side Channel Attacks: The Processor Design-level Context J. Ambrose, A. Ignjaatovic, S. Parameswaran, VDM Verlag Dr. Müller , 2010. |
|
2005: Algorithmic Cryptanalysis A. Joux, CRC Press , 2009. |
|
2004: Algebraic Cryptanalysis G. Bard, Springer, 2009. |
|
2003: Modern Cryptanalysis: Techniques for Advanced Code Breaking C. Swenson, Wiley, 2008. |
|
2002: Power Analysis Attacks: Revealing the Secrets of Smart Cards S. Mangard, E. Oswald, T. Popp, Springer, 2007. |
|
2001: Applied Cryptanalysis M. Stamp, R. M. Low, Wiley, 2007. |
Quantum and Post-Quantum Cryptography
1012: Physical and Data-Link Security Techniques for Future Communication Systems M. Baldi, S. Tomasin, Springer, 2016. |
|
1011: Principles and Methods of Quantum Information Technologies Y. Yamamoto, K. Semba, Springer, 2016. |
|
1010: Quantum Computational Number Theory S. Y. Yan, Springer , 2015. |
|
1009: Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes V. Gauthier Umaña, Scholars' Press, 2014. |
|
1008: Introduction to the Theory of Quantum Information Processing J. A. Bergou, M. Hillery, Springer 2013. |
|
1007: Quantum Attacks on Public Key Cryptography S. Y. Yan, Springer 2013. |
|
1006: Lattices Basis Reduction M. Bremner, CRC Press, 2012. |
|
1005: Applied Quantum Cryptography C. Kollmitzer, M. Pivk (editors), Springer, 2010. |
|
1004: The LLL Algorithm P.Q. Nguyen, B.Vallée, Springer 2010. |
|
1003: Post-Quantum Cryptography D. J. Bernstein, J. Buchmann, E. Dahmen, Springer, 2009. |
|
1002: Quantum Cryptography and Secret Key Distillation G. V. Assche, Cambridge Press, 2006. |
|
1001: Quantum Communications and Cryptography A. V. Sergienko, CRC Press, 2006. |
History of Cryptography
0007: History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms (History of Computing) J. F. Dooley, Springer; Edición: 1st ed. 2018 (24 de agosto de 2018). |
|
0006: Unraveling the Voynich Codex J. Janick, A. O. Tucker, Springer; Edición: 1st ed. 2018 (16 de agosto de 2018). |
|
0005: The Secret History of World War II: Spies, Code Breakers, and Covert Operations N. Kagan, S. G. Hyslop (Authors), K. W. Rendell (Foreword) , National Geographic (25 de octubre de 2016). |
|
0004: Secret History The Story of Cryptology C. P. Bauer, Chapman and Hall/CRC; Edición: 1 (25 de marzo de 2013). |
|
0003: A Brief History of Cryptology and Cryptographic Algorithms J. F. F. Dooley, Springer; Edición: 2013 (24 de septiembre de 2013). |
|
0002: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography S. Singh, Anchor; Edición: Reprint (29 de agosto de 2000). |
|
0001: The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet D. Kahn, Scribner; Edición: Rev Sub (5 de diciembre de 1996). |
Contact.
send suggestions to: José de Jesús Angel Angel
email: jjaa(at)math.com.mx