Cryptography and Computer Network Security

Up

 

Basic textbooks
  William Stallings, Cryptography and Network Security: Principles and Practice, 4th ed., Prentice Hall, 2005, ISBN: 0-13-187316-4.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, Inc., 1996 (all chapters of this book can be downloaded from the book web page), ISBN: 0-84-938523-7.


Related mathematical resources

Basics

  1. Chapters 4 and 8 of
    William Stallings, Cryptography and Network Security: Principles and Practice, 4th ed., Prentice Hall, 2005..
  2. Chapters 2 and 4 of
    Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, Inc., 1996 can be downloaded from the book web page).

Intermediate

  1. Song Y. Yan, Number Theory for Computing, 2nd ed., Springer-Verlag, Berlin, 2002.
  2. David M. Burton, Elementary Number Theory, International Series in Pure and Applied Mathematics, 4th. ed., The McGraw-Hill Companies, Inc., 1997.

Historical books

  1. Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology, 2nd ed. Springer, Berlin, 2000.

Additional reading

  1. M. Welschenbach, Cryptography in C and C++, 2nd ed., Apress, 2005.
  2. T. St Denis and G. Rose, BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic, Syngress, 2006.
  3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, PTR Prentice Hall, Englewood Cliffs, 2002.
  4. Douglas R. Stinson, Cryptography - Theory and Practice, 3rd ed., CRC Press, Inc., 2005.

Electronic newsletters

  CryptoBytes - since 1995
  Crypto-Gram - since 1998

On-line collections of papers

  Springer Lecture Notes in Computer Science
  Cryptology ePrint Archive


Proceedings of the following conferences
(selected articles will be used during the course)

  CHES - since 1999
  RSA Conference - since 1992
  CRYPTO - since 1982
  EUROCRYPT - since 1984
  ASIACRYPT - since 1991