Cryptography/Bibliography: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Sandy Harris
Line 29: Line 29:
* "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar [http://gaudior.net/alma/johnny.pdf PDF]
* "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar [http://gaudior.net/alma/johnny.pdf PDF]


Ross Anderson's book ''Security Engineering'' provides more detailed coverage. The entire first edition and parts of the second are available online. [http://www.cl.cam.ac.uk/~rja14/book.html PDF]
Ross Anderson's book ''Security Engineering'' provides more detailed coverage. The entire first edition and parts of the second are available online. [http://www.cl.cam.ac.uk/~rja14/book.html index page]


==Fiction==
==Fiction==

Revision as of 20:47, 19 May 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of key readings about Cryptography.
Please sort and annotate in a user-friendly manner. For formatting, consider using automated reference wikification.

Elementary

More advanced, but dated

  • Friedman, William F. Military Cryptanalysis

Definitely mathematical

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, by Bruce Schneier — a common reference for programmers
  • Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, somewhat more mathematical than Schneier's book. PDF download
  • Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download.

Difficulties of cryptography

Well-known papers:

  • "Why Cryptosystems Fail", Ross Anderson HTML
  • "Why Cryptography Is Harder Than It Looks", Bruce Schneier HTML
  • "Lessons Learned in Implementing and Deploying Crypto Software", Peter Gutmann PDF
  • "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar PDF

Ross Anderson's book Security Engineering provides more detailed coverage. The entire first edition and parts of the second are available online. index page

Fiction