Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4572 + 2433 = 7005
Home Page
Foundations of Cryptography CSCI 662-01 Spring Semester 2018
Course Page

CSCI 662-01—Foundations of Cryptography
Bibliography and Links

Prof. Alan Kaminsky—Spring Semester 2018
Rochester Institute of Technology—Department of Computer Science

Cryptography Books
Books on Cryptography in Java
Java Tutorials
Java Documentation
Research Journals, Conferences, and Archives
Internet Standards
U.S. Government Standards
Rap


Cryptography Books

Goutam Paul and Subhamoy Maitra. RC4 Stream Cipher and Its Variants. CRC Press, 2012.

Lars Knudsen and Matthew Robshaw. The Block Cipher Companion. Springer-Verlag, 2011.

William Stallings. Cryptography and Network Security: Principles and Practice. Prentice Hall, 2011.

Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, 2010.

Christof Paar and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, 2010.

Antoine Joux. Algorithmic Cryptanalysis. Chapman & Hall/CRC, 2009.

Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.

Christopher Swenson. Modern Cryptanalysis: Techniques for Advanced Code Breaking. John Wiley & Sons, 2008.

Henri Cohen and Gerhard Frey. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall/CRC, 2006.

Susan Loepp and William K. Wootters. Protecting Information: From Classical Error Correction to Quantum Cryptography. Cambridge University Press, 2006.

Douglas R. Stinson. Cryptography: Theory and Practice, 3rd Edition. Chapman & Hall/CRC, 2006.

Wade Trappe and Lawrence C. Washington. Foundations of Cryptography with Coding Theory, 2nd Edition. Prentice Hall, 2006.

Oded Goldreich. Foundations of Cryptography: Volume II Basic Applications. Cambridge University Press, 2004.

Darrel Hankerson, Alfred Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag, 2004.

Wenbo Mao. Modern Cryptography: Theory and Practice. Hewlett-Packard Company/Prentice Hall PTR, 2004.

Niels Ferguson and Bruce Schneier. Practical Cryptography. Wiley Publishing, 2003.
Errata: http://www.schneier.com/book-practical.html

Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.

Oded Goldreich. Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, 2001.

Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
Free online version: http://www.cacr.math.uwaterloo.ca/hac/

Bruce Schneier. Applied Cryptography, 2nd Edition. John Wiley & Sons, 1996.


Books on Cryptography in Java

Jonathan Knudsen. Java Cryptography. O'Reilly & Associates, 1998.


Java Tutorials

The Java Tutorial. http://download.oracle.com/javase/tutorial

Java I/O Tutorial (including object serialization). http://download.oracle.com/javase/tutorial/essential/io/index.html

Java Concurrency Tutorial. http://download.oracle.com/javase/tutorial/essential/concurrency/index.html

Java Exceptions Tutorial. http://download.oracle.com/javase/tutorial/essential/exceptions/index.html

Java Networking Tutorial. http://download.oracle.com/javase/tutorial/networking/index.html

Java RMI Tutorial. http://download.oracle.com/javase/tutorial/rmi/index.html


Java Documentation

Java 2 Standard Edition Software Development Kit Version 1.8.0 Documentation. http://download.oracle.com/javase/8/docs/

Java 2 Standard Edition Software Development Kit Version 1.8.0 API Specification. http://download.oracle.com/javase/8/docs/api/


Research Journals, Conferences, and Archives

The International Association for Cryptologic Research (IACR) website has much useful information. https://www.iacr.org/

Cryptology ePrint Archive [research paper preprints]. https://eprint.iacr.org/

(The full texts of all papers in the Cryptology ePrint Archive are available online for free. However, the site has only limited indexing. Try using Google's Advanced Search to search just that site.)

Cornell University Library arXiv.org [research paper preprints]. Main site: https://arxiv.org. Cryptography and Security section: https://arxiv.org/list/cs.CR/recent.

(The full texts of all arXiv.org papers are available online for free.)

Journal of Cryptographic Engineering [journal]

Journal of Cryptology [journal]

Advances in Cryptology -- ASIACRYPT [conference]

Advances in Cryptology -- AUSCRYPT [conference]

Advances in Cryptology -- CRYPTO [conference]

Advances in Cryptology -- EUROCRYPT [conference]

International Conference on Applied Cryptography and Network Security -- ACNS [conference]

International Workshop on Cryptographic Hardware and Embedded Systems -- CHES [conference]

International Workshop on Fast Software Encryption -- FSE [conference]

International Workshop on Selected Areas in Cryptography -- SAC [conference]

(The above IACR journals and conferences are indexed in the SpringerLink database. The RIT Library has electronic access to this database. The RIT Library might not have electronic access to all volumes. The RIT Library does have hard copies of some volumes; check the catalog. To get free electronic copies of articles not directly available, use the RIT Library's interlibrary loan service. Be aware that articles ordered through interlibrary loan can take several weeks to arrive.)

Cryptologia [journal]

(Cryptologia is indexed at Taylor & Francis. On that web site you can browse tables of contents and look at abstracts for free, but you have to pay to download electronic copies of articles. The RIT Library has neither hard copies of nor electronic access to this journal. Use interlibrary loan if necessary.)

Bruce Schneier. A self-study course in block-cipher cryptanalysis. Cryptologia, 24(1):18-34, January 2000.
http://www.schneier.com/paper-self-study.html

(Although now out-of-date, a nice starting point into the literature on block cipher cryptanalysis.)


Internet Standards

Internet Engineering Task Force (IETF). http://www.ietf.org

IETF Requests for Comments (RFCs) -- Internet standards. http://www.ietf.org/rfc.html

Internet Assigned Numbers Authority (IANA). http://www.iana.org


U.S. Government Standards

Data Encryption Standard (DES). Federal Information Processing Standards Publication 46-3, October 25, 1999. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, November 26, 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

Morris Dworkin. Recommendation for block cipher modes of operation: methods and techniques. NIST Special Publication 800-38A, December 2001. http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf

Morris Dworkin. Recommendation for block cipher modes of operation: the CMAC mode for authentication. NIST Special Publication 800-38B, May 2005. http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf

Morris Dworkin. Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. NIST Special Publication 800-38C, May 2004. http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf

Morris Dworkin. Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. NIST Special Publication 800-38D, November 2007. http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf

Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-3, October 2008. http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf

Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186-3, June 2009. http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf

NIST Cryptographic Hash Algorithm Competition. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html

A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, S. Vo, and L. Bassham. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22, Revision 1a, April 2010. http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf


Rap

MC Frontalot. "Secrets from the Future." http://www.frontalot.com/index.php/?page=lyrics&lyricid=41

Foundations of Cryptography CSCI 662-01 Spring Semester 2018
Course Page
Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4572 + 2433 = 7005
Home Page
Copyright © 2018 Alan Kaminsky. All rights reserved. Last updated 11-Jan-2018. Please send comments to ark­@­cs.rit.edu.