e99 Online Shopping Mall
Help | |
Home - Science - Cryptography (Books) |
  | 1-20 of 100 | Next 20 |
click price to see details click image to enlarge click link to go to the store
1. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier | |
Paperback: 758
Pages
(1996-10-18)
list price: US$60.00 -- used & new: US$24.91 (price subject to change: see help) Asin: 0471117099 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (107)
Fantastic way to start your crypto learning adventure.
No CD
Good but starting to show its age
BS grade.
A great book for start in Cryptography |
2. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno | |
Paperback: 384
Pages
(2010-03-15)
list price: US$55.00 -- used & new: US$24.04 (price subject to change: see help) Asin: 0470474246 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography. Customer Reviews (5)
Exam Questions add little to Practical Cryptography
Nice intro for non-cryptographists
Just an update of an earlier work
The text we've needed
Long awaited update of the Practical Cryptography |
3. Understanding Cryptography: A Textbook for Students and Practitioners by Christof Paar, Jan Pelzl | |
Hardcover: 372
Pages
(2009-12-10)
list price: US$49.95 -- used & new: US$32.00 (price subject to change: see help) Asin: 3642041000 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers. Customer Reviews (6)
Great Book!
Understanding Cryptography
Perfection!
Book is really about understanding cyptography!
Excellent Course Book |
4. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) by Jeffrey Hoffstein, Jill Pipher, J.H. Silverman | |
Paperback: 524
Pages
(2010-11-02)
list price: US$54.95 -- used & new: US$44.37 (price subject to change: see help) Asin: 1441926747 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description An Introduction to Mathematical Cryptography provides an introduction to public key cryptography and underlying mathematics that is required for the subject. Each of the eight chapters expands on a specific area of mathematical cryptography and provides an extensive list of exercises. It is a suitable text for advanced students in pure and applied mathematics and computer science, or the book may be used as a self-study. This book also provides a self-contained treatment of mathematical cryptography for the reader with limited mathematical background. Customer Reviews (3)
Very well written unlike most textbooks
Concepts explained well and plenty of examples to cement them
Excellent |
5. Cryptography and Network Security: Principles and Practice (5th Edition) by William Stallings | |
Hardcover: 744
Pages
(2010-01-24)
list price: US$111.40 -- used & new: US$69.60 (price subject to change: see help) Asin: 0136097049 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description William Stallings' Cryptography and Network Security: Principles and Practice, 5e is apractical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. Customer Reviews (8)
Good conditon and timely delivery
Easy Read
Worst writing ever
aweful
Not outstanding |
6. Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) by Jonathan Katz, Yehuda Lindell | |
Hardcover: 552
Pages
(2007-08-31)
list price: US$81.95 -- used & new: US$61.03 (price subject to change: see help) Asin: 1584885513 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (5)
Excellent book for Self Learning
Book
Review for Katz and Lindell textbook on cryptography
IMHO Best Book on Cryptography
The definitive guide to Cryptography |
7. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh | |
Paperback: 432
Pages
(2000-08-29)
list price: US$16.00 -- used & new: US$7.40 (price subject to change: see help) Asin: 0385495323 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description In the information age, the fear that drives cryptographicimprovements is both capitalistic and libertarian--corporations needencryption to ensure that their secrets don't fall into the hands ofcompetitors and regulators, and ordinary people need encryption tokeep their everyday communications private in a freesociety. Similarly, the battles for greater decryption power come fromsaid competitors and governments wary of insurrection. The Code Book is an excellent primer for those wishing tounderstand how the human need for privacy has manifested itselfthrough cryptography.Singh's accessible style and clear explanationsof complex algorithms cut through the arcane mathematical detailswithout oversimplifying.--Therese Littleton Customer Reviews (278)
Not for kindle
Excellent book
Murder plots, Indiana Joneses, and cyphers
Interesting Read
Great read. |
8. Cryptography Decrypted by H. X. Mel, Doris M. Baker | |
Paperback: 384
Pages
(2000-12-31)
list price: US$49.99 -- used & new: US$34.99 (price subject to change: see help) Asin: 0201616475 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (38)
Good introduction to foundations of cryptogrpahy
Great book for beginners for sure
Super Supreme!
Best explanation of public key algorithm
quick reference on PKI |
9. Practical Cryptography by Niels Ferguson, Bruce Schneier | |
Paperback: 432
Pages
(2003-03-28)
list price: US$50.00 -- used & new: US$9.59 (price subject to change: see help) Asin: 0471223573 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (16)
Great Book
Cryptography Explained for the Practical Implementation
If you write software this book will help you understand cryptography
Biased to Schneier's algorithms
Self contradictory and selflauding |
10. Cryptography: A Very Short Introduction (Very Short Introductions) by Fred Piper, Sean Murphy | |
Paperback: 160
Pages
(2002-07-15)
list price: US$11.95 -- used & new: US$6.25 (price subject to change: see help) Asin: 0192803158 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
excellent read
covers the main ideas, with little maths needed |
11. Cryptography: The Science of Secret Writing by Laurence D. Smith | |
Paperback: 164
Pages
(1955-06-01)
list price: US$8.95 -- used & new: US$4.87 (price subject to change: see help) Asin: 048620247X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (4)
Fun
Great intro to Cryptography
An interesting look at encryption before the computer
An excellent introduction to cryptograhpy |
12. Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) by Douglas R. Stinson | |
Hardcover: 616
Pages
(2005-11-01)
list price: US$69.95 -- used & new: US$55.00 (price subject to change: see help) Asin: 1584885084 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description If you are new tothe math behind cryptography but want to tackle it, the author coversall of the required background to understand the real mathematicshere. Cryptography includes extensive exercises with eachchapter and makes an ideal introduction for any math-literate personwilling to get acquainted with this material. Customer Reviews (14)
A Cryptography Teaching Textbook
A good reference
Good book after Schneier's Non-Mathematical Treatment
Volume III ofthe Definitive Work
Could be a great book .... but it falls short |
13. Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Discrete Mathematics and Its Applications) by Alexander Stanoyevitch | |
Hardcover: 669
Pages
(2010-08-09)
list price: US$89.95 -- used & new: US$66.20 (price subject to change: see help) Asin: 1439817634 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography. |
14. Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich | |
Paperback: 396
Pages
(2007-01-18)
list price: US$50.00 -- used & new: US$45.00 (price subject to change: see help) Asin: 0521035368 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (5)
Rich but the language is difficult
A must have for people doing research in theoretical crypto
Fundamental book for anyone working with cryptography
Great idea -- needs a good editor! However, the bad part is that the writing is simply horrible.There seems to be little planning and things simply don't flow at all.Here's a specific example, which is so bad as to almost be funny:There's a huge use of footnotes for side comments, mostly because of this "stream of consciousness" writing that doesn't work things in properly.The first footnote in chapter 4 says, believe it or not, "See Footnote 13".Huh?So I go digging through the later part of the chapter, looking desperately for this gem of knowledge that will be in footnote 13, and what is it?The definition of a graph!Now come on -- chapter 4 of a book, where we've been dealing with advanced topics in computer science, and they feel the need to define a graph!?!?!Through several levels of indirection in footnotes?Come on guys, what editor let that one through? Oded is a great computer scientist, and a good guy, but please, PLEASE get a good editor for the other volumes, or maybe even a good writer to team up with!
Superb presentation of the theoretical foundations. The planned 3-volume series aims to provide a thorough presentation of the theory, written by a dominant figure in the field. This first volume introduces the basic notions: one-way functions, pseudorandom generators, various zero-knowledge proof systems and related concepts. Curiously, common cryptographic objects such as encryption schemes and signature schemes are only briefly discussed in an appendix -- the author has chosen to postpone these to the Volume 2 in the interest of in-depth discussion of the simpler objects. Hence this volume does not stand well on its own, and until Volume 2 is published the impatient reader may be disappointed. Fortunately, drafts of Volume 2 are available on-line: www.wisdom.weizmann.ac.il/~oded/foc-vol2.html The presentation style is a tour de force of didactic sensitivity. The subject material is often problematic, because the mental gymnastics required are not quite like any other field. The author is fully aware of this, and provides ample intuitive discussion and motivation to help the reader through the more technical parts (without compromising rigorousness). A clear effort is made to present, or at least mention and reference, all interesting results pertaining to the discussion. This makes the book invaluable as a reference, though it could have been overwhelming had not the author taken care to separate these excursions from the main discussion. The exercises are usually well-considered and rewarding, and unlike some textbooks you won't find important results disguised as an optional exercise. Those interested primarily in practical applications of cryptography may well find this book too abstract and irrelevant; the relation between this book and Schneier's "Applied Cryptography" is roughly like that between organic chemistry and cooking. However, for those taking academic interest in the field or trying to devise novel cryptographic schemes, this book is an effective way to get a solid grasp on the theory, and a delightful way to understand this exciting branch of computer science. ... Read more |
15. Cryptography for Dummies by Chey Cobb | |
Paperback: 336
Pages
(2004-01-30)
list price: US$29.99 -- used & new: US$17.01 (price subject to change: see help) Asin: 0764541889 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (10)
A good "for dummies" book.
Great intro to Crypto
Disappointing Read
Disappointing
Pretty Good Intro to Cryptography |
16. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More by John Viega, Matt Messier | |
Paperback: 792
Pages
(2003-07-14)
list price: US$74.99 -- used & new: US$19.00 (price subject to change: see help) Asin: 0596003943 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (13)
Completely useless for PKI programming
Good developer reference
a good reference if you've really got to be secure
Great book for anyone using C These guys literally wrote the book on secure code. Read it!
A task-oriented reference guide Its strengths include: --Good coverage of cryptography programming However, some areas of improvement might be: --Could use more coverage of important subjects (buffer overflows, etc.) It is probably not the first book you should read on the subject. This is more of a recipe guide that is useful if you get stuck on coding a particular topic that happens to be covered. The authors have done a good job of explaining what coverage they do and don't include. ... Read more |
17. Cryptography in C and C++, Second Edition by Michael Welschenbach | |
Hardcover: 504
Pages
(2005-05-25)
list price: US$79.99 -- used & new: US$29.50 (price subject to change: see help) Asin: 1590595025 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of new material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing. Customer Reviews (11)
cryptography for cryptographers
Good book with valuable source code
practical guide to software implementation of cryptography
Excellent!
Good book -- Wrong title The great majority of this book is a detailed, step-by-step account of the how the author constructed a C-language big-number library. It treats wrapping the C-libraries with C++ classes as a separate chapter -- nice touch. This treatise is thorough, well-written, and engaging. Nicely done. It is written from a mathematicians perspective, and its mathematical underpinnings may repel some programmers, but they need not fear. In the end the C-code is well-explained. The only "cryptography" of note is a chapter on implementing RSA with the library. Indeed, the great majority of implementing RSA and similar ciphers is creating the big-number libraries. The RSA chapter is, fortunately, much more than a simple example. It is an excellent treatise of the pitfalls in implementing RSA. That is, RSA is more than a "simple example." If you are implemeting RSA with any big-number library, this chapter alone is worth the cost of admission. There is a chapter on AES (Rijndael) cipher, but it is out of place here and an obvious paste-on, probably a last minute, hot-button item required by the publisher. It really has nothing you can't get from the original NIST documents on AES. I'm willing to believe that the title and AES paste-on are the fault of the publisher, because otherwise Welschenbach did an excellent job -- lots of hard and careful work, well documeted. With a title-change, I'd give it a 5-star. The question in the end is: Why would you want this book? Apart from general interest, the audiences that come to my mind are those who are constructing such libraries on their own, and those who need to use the software included with the book (on a non-commercial basis -- the software license prohibits commercial use). ... Read more |
18. Beginning Cryptography with Java by David Hook | |
Paperback: 480
Pages
(2005-08-19)
list price: US$39.99 -- used & new: US$14.99 (price subject to change: see help) Asin: 0764596330 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME. What you will learn from this book Who this book is for This book is for Java developers who want to use cryptography in their applications or to understand how cryptography is being used in Java applications. Knowledge of the Java language is necessary, but you need not be familiar with any of the APIs discussed. Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved. Customer Reviews (7)
Very Helpful and Up To Date
a really useful one
Great book by an expert on the subject
Book needs update to J2SE 5.0
Very hands-on |
19. Malicious Cryptography: Exposing Cryptovirology by Adam Young, Moti Yung | |
Paperback: 416
Pages
(2004-02-27)
list price: US$45.00 -- used & new: US$3.50 (price subject to change: see help) Asin: 0764549758 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description They will take you inside the brilliant and devious mind of a hacker--as much an addict as the vacant-eyed denizen of the crackhouse--so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Customer Reviews (10)
A great technical book for advanced users
Excellent!!!
totally rads
Excellent After a "motivational chapter" that it meant to shed insight on what it is like to be a hacker, this being done through a collection of short stories, the authors move on to giving a general overview of the field of cryptovirology in chapter 2. The reader gets his first dose of zero-knowledge interactive proofs (ZKIPs), which allow a prover to convince a verifier of a fact without revealing to it why the fact is true. The authors point out that viruses are vulnerable once found, since their rudimentary programming can be then studied and understood. This motivates the introduction of public key cryptography into the payload of the virus, and it is at this point that the field of cryptovirology is born. Chapter 3 is more of a review of modular arithmetic, entropy generators, and pseudorandom number generators and can be skipped for those readers familiar with these. The authors emphasize the need for effective random number generators and in using multiple sources for entropy generation. They also introduce the very interesting concept of a `mix network', which allows two mutually distrusting parties to communicate securely and anonymously over a network. `Onion routing' is discussed as a method for implementing asynchronous mix networks. Mix networks can be used to hide the propagation history of a worm or virus. In chapter 4, the authors discuss how to implement anonymous communication and how to launch a cryptotrojan attack that utilizes an anonymous communication channel. There are many applications of anonymous communication, one being E-money, and also, unfortunately, money laundering. The authors describe in fair detail how to conduct criminal operations with mix networks and anonymous money. This same technology though allows freedom of speech in geographical areas that are not sympathetic to it. Electronic voting, so controversial at the present time, is discussed as an activity that is very susceptible to the threat of stegotrojans or government violation of anonymity. Techniques for doing deniable password snatching using cryptovirology, and for countering it using zero-knowledge proofs, are also discussed. Chapter 5 introduces techniques for preventing the reading of counters when a virus is propagating from one machine to another. Known as `cryptocounters', the authors discuss various techniques for constructing them, such as the ElGamal and Paillier public key cryptosystems. Private information retrieval (PIR), which allows the secure and private theft of information, is discussed in chapter 6, wherein the authors present a few schemes for performing PIR. These schemes, unfortunately, allow the theft of information without revealing anything about the information sought and without revealing anything about what is taken. The authors also introduce a concept that they call `questionable encryptions', which are algorithms to produce valid encryptions or fake encryptions depending on the inputs. Related to question encryption, and also discussed in this chapter, are `deniable encryptions', which allow the sender to produce fake random choices that result in the true plaintext to be kept secret. Also discussed is the topic of `cryptographic computing', which allows computations with encrypted data without first having to decrypt it. The modular arithmetic used in this chapter is fascinating and well worth the read. Chapter 7 is by far the most interesting of the entire book, and also the most disconcerting if its strategies are ever realized. The goal of the chapter is to find out to what extent a virus can be constructed whose removal will damage the host machine. This, in the author's opinion, would be a genuine `digital disease', and they discuss various scenarios for bringing it about, which are at present not realized, but could be in the near future. The approach discussed involves game theory, and the authors show how the payload of a virus can survive even after discovery of the virus. They give a very detailed algorithm on how to attack a brokerage firm, including the assumptions that must be satisfied by such an attack. The attack is mounted by deploying a distributed cryptovirus that tries to find three suitable host machines, and the attack consists of three phases, the first involving replication leading to the infection of the three machines, the second involving preparation for the attack, and third involving playing the two-player game. The host machines, to be acceptable for launching the attack, must either be "brokerage" machines, which have sensitive information available to the virus, or "reclusive" machines, which are machines that are not subjected to much scrutiny.The goal of the virus, according to the authors, is to give the malware purchasing power, and not direct monetary gain. The virus may then evolve over time to become a portfolio manager, and may even act as a surrogate for purchasing shares on behalf of the firm or client. Other possibilities for the virus are discussed, and the authors overview the security of the attack and its utility. I did not read the rest of the chapters in the book, so I will omit their review.
Heaven's dark side To be sure this is not easy reading. It is adult material, meaning that thinking is required. But it could not be otherwise, the material would not allow it. However the reader will be well rewarded for every morsel of math they endeavor to puzzle through. The realization of the potential dark side of modern cryptography is the first step in preparing to defend against it. This book provides that realization. The reader may find the first few chapters to be an entertaining fictional account of some days in the life of a hacker. Indeed, the text reads beautifully as such. But here is a chilling thought - what if the events described were real? ... Read more |
20. Handbook of Applied Cryptography by Alfred J. Menezes | |
Hardcover:
Pages
(1997)
-- used & new: US$89.99 (price subject to change: see help) Asin: B003Q8LVSS Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (16)
Advanced Crypto for the college mind.
Fantastic traditional reference
A very detailed book, but not for everyone. If you don't have a ton of mathematical background and are scared of having to take a crash course in number theory, or are looking for a higher level view of things, I'd suggest something more along the lines of Bruce Schneier's 'Applied Cryptography' (ASIN 0471117099). If you have some mathematical background, but want to get into things in detail, this is probably for you. If you're not sure whether you'll like the book, you should definitely take a look at it. While Amazon currently doesn't have sample pages, if you do a Web Search on "Handbook of Applied Cryptography", you can find Sample Chapters hosted online to give you a good feel for the book's style.
Complete and satisfying
Very depthful yet readable |
  | 1-20 of 100 | Next 20 |