Douglas Stinson. Subtitled "Discrete Mathematics and Its Applications". Written with more emphasis on theory than practice, as acknowledged in the preface.
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world applications.
Sarah Flannery's supplement to her book "In Code", describing her Cayley-Purser algorithm.
Cryptography book reviews, links to online erratas, and free book downloads. Most books have charts that recommend prerequisite books, mathematics and programming language experience.
Simon Singh. Traces the development of codes and code-breaking from military espionage in ancient Greece to modern computer ciphers.
Online tutorial with useful info and links.
Mel and Baker, has sample chapters.
The online version of the 1996 CRC book by Menezes, van Oorschot and Vanstone (5th edition) in PostScript and PDF formats.
Burnett and Paine. Explains the differences between symmetric-key and public-key cryptography, how PKI and X.509 affect security and how the RSA algorithm works within protocols.
Science /
Math /
Publications
|