## Textbooks

*
Cryptography and Network Security: Principles and Practice*
by William Stallings,
Prentice Hall; 5th edition, 2011,
ISBN: 978-0-13-609704-4

*
Handbook of Applied Cryptography*
by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone,
CRC Press, Inc.; 1996,
ISBN: 0-84-938523-7.
(all chapters of this book can be downloaded from the
book web page)

## Related Mathematical Resources

### Basics

**Chapters 4 and 8** of

William Stallings, *
Cryptography and Network Security: Principles and Practice*,
Prentice Hall; 5th edition, 2011.

**Chapters 2 and 4** of

Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, *
Handbook
of Applied Cryptography*, CRC Press, Inc., 1996
(can be downloaded from the
book
web page).

### Intermediate

Song Y. Yan, *Number Theory
for Computing*, 2nd ed., Springer-Verlag, Berlin, 2002.

David M. Burton, *Elementary
Number Theory*, International Series in Pure and Applied Mathematics,
3rd. ed., The McGraw-Hill Companies, Inc., 1997.

## Historical Books

David
Kahn, *The
Codebreakers: The Comprehensive History of Secret Communication from
Ancient Times to the Internet*, 2nd ed., Scribner, New York,
1996.

Simon
Singh, *The
Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum
Cryptography*, Anchor, 2000.

Friedrich L. Bauer,
*Decrypted
Secrets: Methods and Maxims of Cryptology*, 2nd ed. Springer,
Berlin, 2000.

Steven
Levy, *Crypto:
How the Code Rebels Beat the Government Saving Privacy in the Digital
Age*, Penguin Putnam, 2002.

## Additional Reading

Charlie Kaufman,
Radia Perlman, and Mike Speciner, *Network Security: Private Communication
in a Public World*, PTR Prentice Hall, Englewood Cliffs, 2002.

M. Welschenbach,
*Cryptography in C and C++*, Apress, 2001.

Douglas
R. Stinson, *
Cryptography
- Theory and Practice, 3rd ed., CRC Press*, Inc., 2005.

Bruce
Schneier, *Applied
Cryptography - Protocols, Algorithms, and Source Code in C*,
2nd ed., John Wiley & Sons, Inc., New York, 1995.

## Electronic Newsletters

## On-line Collections of Papers

Springer-Verlag Lecture Notes in Computer Science

IACR Cryptology ePrint Archive

## Journals and Periodicals

*Journal
of Cryptology* - since 1989

*CryptoBytes*
- since 1995

*Journal
of Computer Security* - since 1994

## Proceedings of the Following Conferences

(selected articles will be used during the course)

- RSA Data Security Conf. - since 1992
- CHES - since 1999
- CRYPTO - since 1982
- EUROCRYPT - since 1984
- ASIACRYPT - since 1991