IACR logo

Book Reviews

The following reviews shall help the IACR members and the community to buy books in cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Edoardo Persichetti (Dakota State University, USA) via books at iacr.org . You can check the list of reviewable books to see if your favourite book is still available. At the moment, this list contains books of Cambridge University Press , CRC Press/Taylor & Francis , Elsevier , Presses Polytechnique Et Universitaires Romandes , Springer and Wiley , whose support we hereby gratefully acknowledge.

The reviews are organized by publishing house. If you search for a specific topic or author, you can use <CTRL>+F (or likewise) in your browser.

Cambridge University Press

  1. T. Alpcan, T. Basar: Network Security - A Decision and Game-Theoretic Approach

  2. I. Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography

  3. R. Churchhouse: Codes and Ciphers

  4. I. Csiszar, J. Koerner: Information Theory: Coding Theorems for Discrete Memoryless Systems

  5. E. Desurvire: Classical and Quantum Information Theory

  6. O. Goldreich: Foundations of Cryptography, Volumes I and II

  7. S. W. Golomb, G. Gong: Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar

  8. M. Hendry: Multi-application Smart Cards Technology and Applications

  9. R. Lidl, H. Niederreiter: Finite Fields (2nd Edition)

  10. S. Loepp, W. Wootters: Protecting Information: From Classical Error Correction to Quantum Cryptography

  11. J. H. Loxton: Number Theory and Cryptography

  12. R. J. McEliece: The Theory of Information and Coding (2nd Edition)

  13. N. D. Mermin: Quantum Computer Science

  14. M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information

  15. M. Obaidat, N. Boudriga: Security of e-Systems and Computer Networks

  16. J. Talbot, D. Welsh: Complexity and Cryptography: An Introduction

  17. J. C. A. Van Der Lubbe: Basic Methods of Cryptography

CRC Press/Taylor & Francis Group

  1. S. A. Ahson, M. Ilyas: Cloud Computing and Software Services - Theory and Techniques

  2. F. Bonchi, E. Ferrari (Editors): Privacy-Aware Knowledge Discovery

  3. N. Boudriga: Security of Mobile Communications

  4. W. J. Buchanan: Introduction to Security and Network Forensics

  5. Z. Cao: New Directions of Modern Cryptography

  6. G. Chartrand, P. Zhang: Chromatic Graph Theory

  7. H. Cohen, G. Frey: Handbook of Elliptic and Hyperelliptic Curve Cryptography

  8. A. Das: Computational Number Theory

  9. S. N. Elaydi: Discrete Chaos, second edition

  10. A. J. Elbirt: Understanding and Applying Cryptography and Data Security

  11. M. Erickson, A. Vazzana: Introduction to Number Theory

  12. B. Furht, D. Kirovski: Multimedia Watermarking Techniques and Applications

  13. R. Garnier, G. Taylor: Discrete Mathematics

  14. R. J. Gould: Mathematics in Games, Sports, and Gambling

  15. J. Graham, R. Howard, R. Olson: Cyber Security Essentials

  16. D. W. Hardy, F. Richman, C. L. Walker: Applied Algebra - Codes, Ciphers, And Discrete Algorithms

  17. S. Heubach, T. Mansour: Combinatorics of Compositions and Words

  18. M. J. Hinek: Cryptanalysis of RSA and its Variants

  19. F. Hu, X. Cao: Wireless Sensor Networks: Principles and Practice

  20. D. Jacobson: Introduction to Network Security

  21. R. C. Joshi, A. Sardana: Honeypots: A New Paradigm to Information Security

  22. A. Joux: Algorithmic Cryptanalysis

  23. A. Joux: Algorithmic Cryptanalysis

  24. J. Katz, Y. Lindell: Introduction to Modern Cryptography

  25. J. Koolen, J. Ho Kwak, M.-Y. Xu (Editors): Applications of Group Theory to Combinatorics

  26. J. S. Kraft, L. C. Washington: An Introduction to Number Theory with Cryptography

  27. D. J. Landoll: The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments

  28. S. Lian: Multimedia Content Encryption: Techniques and Applications

  29. N. A. Loehr: Bijective Combinatorics

  30. A. Lozano-Nieto: RFID Design Fundamentals and Applications

  31. A. McAndrew: Introduction to Cryptography with Open-Source Software

  32. M. S. Merkow, L. Raghavan: Secure and Resilient Software Development

  33. R. A. Mollin: Advanced Number Theory with Applications

  34. R. A. Mollin: Algebraic Number Theory (2nd Edition)

  35. R. A. Mollin: Codes: The Guide to Secrecy from Ancient to Modern Times

  36. R. A. Mollin: Fundamental Number Theory with Applications (2nd Edition)

  37. G. L. Mullen, D. Panario: Handbook of Finite Fields

  38. R. C. Newman: Computer Forensics - Evidence Collection and Management

  39. A. S. K. Pathan: Security of Self-Organizing Networks

  40. F. Roberts, B. Tesman: Applied Combinatorics (2nd Edition)

  41. F. Roberts, B. Tesman: Applied Combinatorics (2nd Edition)

  42. K. Rosen: Handbook of Discrete & Combinatorial Mathematics (2nd Edition)

  43. B. Rosenberg: Handbook of Financial Cryptography and Security

  44. J. Smith: Introduction to Abstract Algebra

  45. J.J. Stapleton: Security without Obscurity

  46. A. Stanoyevitch: Discrete Structures with Contemporary Applications

  47. A. Stanoyevitch: Introduction to Cryptography

  48. A. K. Talukder, M. Chaitanya: Architecting Secure Software Systems

  49. G. Valiente: Combinatorial Pattern Matching Algorithms in Computational Biology using Perl and R

  50. L. C. Washington: Elliptic Curves - Number Theory and Cryptography (2nd Edition)

  51. Y. Zhang, P. Kitsos: Security in RFID and Sensor Networks

  52. Y. Zhang, J. Zheng, H. Hu: Security in Wireless Mesh Networks

Elsevier

  1. K. de Leeuw, J. Bergstra (Editors): The History of Information Security - A Comprehensive Handbook

Presses Polytechnique Et Universitaires Romandes

  1. G. Avoine, P. Oechslin, P. Junod: Computer System Security: Basic Concepts and Solved Exercises

  2. B. Martin: Codage, Cryptologie et Applications [French]

  3. M. H. Sherif: Paiements \'electroniques s\'ecuris\'es [French]

  4. I. Tashi, S. Ghernaouti Helie: Information Security Evaluation: A holistic Approach

  5. S. Vaudenay: La Fracture Cryptographique [French]

Springer

  1. M. Aigner, G. M. Ziegler: Proofs from THE BOOK (4th Edition)

  2. T. Baignères, P. Junod, Y. Lu, J. Monnerat, S. Vaudenay: A Classical Introduction To Cryptography Exercise Book

  3. M.W. Baldoni, C. Ciliberto, G.M. Piacentini Cattaneo: Elementary Number Theory, Cryptography and Codes

  4. G. V. Bard: Algebraic Cryptanalysis

  5. F. L. Bauer: Historische Notizen zur Informatik [German]

  6. F. L. Bauer: Decrypted Secrets - Methods and Maxims of Cryptology

  7. F. L. Bauer: Entzifferte Geheimnisse - Methoden und Maximen der Kryptologie [German]

  8. G. Bella: Formal Correctness of Security Protocols

  9. D. J. Bernstein, J. Buchmann, E. Dahmen (Editors): Post-Quantum Cryptography

  10. N. L. Biggs: Codes: An Introduction to Information, Communication and Cryptography

  11. J. Biskup: Security in Computing Systems

  12. C. Boyd, A. Mathuria: Protocols for Authentication and Key Establishment

  13. J. Buchmann: Introduction to Cryptography

  14. J. Buchmann, E. Karatsiolis, A. Wiesmaier: Introduction to Public Key Infrastructures

  15. J. Buchmann, U. Vollmer: Binary Quadratic Forms

  16. J. Calmet, W. Geiselmann, J. Mueller-Quade: Mathematical Methods in Computer Science

  17. S. Chatterjee, P. Sarkar: Identity-Based Encryption

  18. H. Chen, E. Reid, J. Sinai, A. Silke, B. Ganor: Terrorism Informatics

  19. K.-K. R. Choo: Secure Key Establishment

  20. C. Cid, S. Murphy, M. Robshaw: Algebraic Aspects of the Advanced Encryption Standard

  21. P. H. Cole, D. C. Ranasinghe: Networked RFID Systems and Lightweight Cryptography

  22. R. Crandall, C. Pomerance: Prime Numbers: A Computational Perspective

  23. C. Cremers, S. Mauw: Operational Semantics and Verification of Security Protocols

  24. E. Damiani, C. A. Ardagna, N. El Ioini: Open Source Systems Security Certification

  25. H. Delfs, H. Knebl: Introduction to Cryptography, Principles and Applications (2nd Edition)

  26. A. W. Dent, Y. Zheng: Practical Signcryption

  27. M. Dietzfelbinger: Primality Testing in Polynomial Time

  28. J. Ding, J. E. Gower, D. S. Schmidt: Multivariate Public Key Cryptosystems

  29. S. Foresti: Preserving Privacy in Data Outsourcing

  30. A. A. Ghorbani, W. Lu, M. Tavallaee: Network Intrusion Detection and Prevention

  31. J. L. Gomez Pardo: Introduction to Cryptography with Maple

  32. M. Hafner, R. Breu: Security Engineering for Service-Oriented Architectures

  33. C. Hazay, Y. Lindell: Efficient Secure Two-Party Protocols

  34. D. Henrici: RFID Security and Privacy

  35. M. Higgins: Number Story: From Counting to Cryptography

  36. J. Hoffstein, J. Pipher, J. Silverman: An Introduction to Mathematical Cryptography

  37. J. Hromkovic: Algorithmic Adventures

  38. J. Hromkovic: Theoretical Computer Science

  39. J. Katz: Digital Signatures

  40. J. M. Kizza: Guide to Computer Network Security

  41. L. R. Knudsen and M. J. B. Robshaw: The Block Cipher Companion

  42. Ç. K. Koç: Cryptographic Engineering

  43. L. Kocarev, S. Lian: Chaos-Based Cryptography

  44. C. Koscielny, M. Kurkowski, and M. Srebrny: Modern Cryptography Primer

  45. L. C. Larson: Problem-Solving Through Problems

  46. W. Lee, C. Wand, D. Dagon: Botnet Detection

  47. K. Lemke, C. Paar, M. Wolf (Editors): Embedded Security in Cars

  48. M. Li, P. Vitanyi: An Introduction to Kolmogorov Complexity and Its Applications

  49. R. J. Lipton: The P=NP Question and Gödel’s Lost Letter

  50. S. Mangard, E. Oswald, T. Popp: Power Analysis Attacks: Revealing the Secrets of Smart Cards

  51. K. Mayes, K. Markantonakis (Editors): Secure Smart Embedded Devices, Platforms and Applications

  52. K. Mayes, K. Markantonakis (Editors): Smart Cards, Tokens, Security and Applications

  53. K. Mehlhorn, P. Sanders: Algorithms and Data Structures: The Basic Toolbox

  54. P. Nguyen, Vallee: The LLL Algorithm

  55. F. Nielsen: A Concise and Practical Introduction to Programming Algorithms in Java

  56. C. Paar, J. Pelzl: Understanding Cryptography

  57. H. Riesel: Prime Numbers and Computer Methods for Factorization

  58. J. Rothe: Complexity Theory and Cryptology - An Introduction to Cryptocomplexity

  59. J. Rothe: Komplexitätstheorie und Kryptologie - Eine Einführung in die Kryptokomplexität [German]

  60. C. Rousseau, Y. Saint Aubin: Mathematics and Technology

  61. A.-R. Sadeghi, D. Naccache (Editors): Towards Hardware-Intrinsic Security: Foundations and Practice

  62. M. Sala, T. Mora, L. Perret, S. Sakata, C. Traverso (Editors): Gröbner Bases, Coding, and Cryptography

  63. D. Salomon: Elements of Computer Security

  64. A. J. Sammes, B. Jenkinson: Forensic Computing: A Practitioner's Guide

  65. B. Schneier: Beyond Fear

  66. A. Singh, B. Singh: Identifying Malicious Code Through Reverse Engineering

  67. P. Stavroulakis, M. Stamp: Handbook of Information and Communication Security

  68. H. Stichtenoth: Algebraic Function Fields and Codes (2nd Edition)

  69. Y. Sun, W. Trappe, K. J. R. Liu: Network-Aware Security for Group Communications

  70. P. Traynor, P. McDaniel, T. La Porta: Security for Telecommunications Networks

  71. P. Tuyls, B. Skoric, T. Kevenaar (Editors): Security with Noisy Data

  72. S. Vaudenay: A Classical Introduction to Cryptography: Applications for Communications Security

  73. S. Y. Yan: Cryptanalytic Attacks on RSA

  74. S. Y. Yan: Primality Testing and Integer Factorization in Public-Key Cryptography

  75. K. Yang, X. Jia: Security for Cloud Storage Systems

Wiley

  1. R. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)

Go up .