by Keijo Ruohonen
Publisher: Tampere University of Technology 2010
Number of pages: 136
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced together with its backgrounds.
Home page url
Download or read it online for free here:
by Phil Zimmermann
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
by David Joyner - Springer
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. There are both historical and mathematical papers on cryptography.
by Shafi Goldwasser, Mihir Bellare
This is a set of lecture notes on cryptography for a one week long course on cryptography taught at MIT. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.