Publisher: United States Department of the Army 1990
Text contains six parts: Introduction to Cryptanalysis, Monographic Substitution Systems, Polygraphic Substitution Systems, Polyalphabetic Substitution Systems, Transposition Systems, and Analysis of Code Systems. Text also contains exhaustive material to aid in the solution of cipher systems, including frequency distributions, word and pattern tables, as well as utility tables.
Home page url
Download or read it online for free here:
(multiple PDF/PS files)
by Neal R. Wagner - Univ. of Texas San Antonio
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
by Neal Koblitz (ed.) - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
by Mihir Bellare, Phillip Rogaway
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
by Henk C. A. van Tilborg - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.