An introduction to Cryptography
by Phil Zimmermann
Number of pages: 80
This guide describes how to use PGP (Pretty Good Privacy) to securely manage your organization’s messages and data storage. The book provides an overview of the terminology and concepts you will encounter as you use PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography.
Download or read it online for free here:
by Bing Qi, Li Qian, Hoi-Kwong Lo - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
by David Joyner - Springer
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. There are both historical and mathematical papers on cryptography.