**Coding Theory and Cryptography**

by David Joyner

**Publisher**: Springer 2000**ISBN/ASIN**: 3540663363**ISBN-13**: 9783540663362**Number of pages**: 256

**Description**:

This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas others are the result of original research. There are both, historical and mathematical papers on cryptography. Several of the contributions on cryptography describe the work done by the British and their allies during World War II to crack the German and Japanese ciphers.

Download or read it online for free here:

**Download link**

(multiple formats)

## Similar books

**A brief introduction of quantum cryptography for engineers**

by

**Bing Qi, Li Qian, Hoi-Kwong Lo**-

**arXiv**

We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.

(

**7887**views)

**Foundations of Cryptography**

by

**Oded Goldreich**-

**Cambridge University Press**

The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.

(

**9338**views)

**Cracking Codes with Python**

by

**Al Sweigart**-

**inventwithpython.com**

The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.

(

**992**views)

**Lecture Notes on Cryptography**

by

**Shafi Goldwasser, Mihir Bellare**

This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.

(

**8214**views)