Public-Key Cryptography: Theory and Practice
by Bodo Moeller
Publisher: TU Darmstadt 2003
Number of pages: 117
This dissertation examines multiple aspects of public-key cryptography. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
Home page url
Download or read it online for free here:
by David Joyner - Springer
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. There are both historical and mathematical papers on cryptography.
by Mihir Bellare, Phillip Rogaway
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
by Neal Koblitz (ed.) - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.