Cryptography/Bibliography: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Sandy Harris
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}
==Elementary==
==Elementary==
* Gaines, Helen F. ''Cryptanalysis''
* Gaines, Helen F. ''Cryptanalysis''
* Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level
* Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level
Line 15: Line 14:


==More advanced, but dated==
==More advanced, but dated==
* Friedman, William F. ''Military Cryptanalysis''
* Friedman, William F. ''Military Cryptanalysis'' The original Friedman version is [http://www.nsa.gov/public_info/declass/military_cryptanalysis.shtml available] on the NSA site. The later revised version, ''Military Cryptanalytics'' is not.


==Definitely mathematical==
==Definitely mathematical==
* Schneier, Bruce. ''Applied Cryptography: Protocols, Algorithms, and Source Code in C''
* ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'', by Bruce Schneier — a common reference for programmers
* [http://www.cacr.math.uwaterloo.ca/hac/ Handbook of Applied Cryptography] by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone (PDF download available), somewhat more mathematical than Schneier's book.
* ''Handbook of Applied Cryptography'' by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, somewhat more mathematical than Schneier's book. [http://www.cacr.math.uwaterloo.ca/hac/ PDF download]
* ''Introduction to Modern Cryptography'' by [[Phillip Rogaway]] and [[Mihir Bellare]], a mathematical introduction to theoretical cryptography including reduction-based security proofs.  [http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf PDF download].
* ''Introduction to Modern Cryptography'' by [[Phillip Rogaway]] and [[Mihir Bellare]], a mathematical introduction to theoretical cryptography including reduction-based security proofs.  [http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf PDF download].
== Difficulties of cryptography ==
Well-known papers:
* "Why Cryptosystems Fail", Ross Anderson [http://www.cl.cam.ac.uk/~rja14/Papers/wcf.html HTML]
* "Why Cryptography Is Harder Than It Looks", Bruce Schneier [http://www.schneier.com/essay-037.html HTML]
* "Lessons Learned in Implementing and Deploying Crypto Software", Peter Gutmann [http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix02.pdf PDF]
* "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar [http://gaudior.net/alma/johnny.pdf PDF]
Ross Anderson's book ''Security Engineering'' provides more detailed coverage. The entire first edition and parts of the second are available online. [http://www.cl.cam.ac.uk/~rja14/book.html index page]


==Fiction==
==Fiction==

Latest revision as of 20:53, 10 May 2011

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of key readings about Cryptography.
Please sort and annotate in a user-friendly manner. For formatting, consider using automated reference wikification.

Elementary

More advanced, but dated

  • Friedman, William F. Military Cryptanalysis The original Friedman version is available on the NSA site. The later revised version, Military Cryptanalytics is not.

Definitely mathematical

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, by Bruce Schneier — a common reference for programmers
  • Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, somewhat more mathematical than Schneier's book. PDF download
  • Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download.

Difficulties of cryptography

Well-known papers:

  • "Why Cryptosystems Fail", Ross Anderson HTML
  • "Why Cryptography Is Harder Than It Looks", Bruce Schneier HTML
  • "Lessons Learned in Implementing and Deploying Crypto Software", Peter Gutmann PDF
  • "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar PDF

Ross Anderson's book Security Engineering provides more detailed coverage. The entire first edition and parts of the second are available online. index page

Fiction