Search The Infography: 
The Infography

Cryptography

The following sources are recommended by a professor whose research specialty is cryptography.


 

Six Superlative Sources

· "Cryptography: Theory and Practice," by Douglas Stinson, CRC Press, 1995. ISBN: 0-8493-8521-0.

· "Applied Cryptography, Second Edition," by Bruce Schneier, John Wiley and Sons, 1996. ISBN: 0-471-11709-9.

· "Handbook of Applied Cryptography," by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, CRC Press, 1996. ISBN: 0-8493-8523-7.

· Proceedings of the Crypto, Eurocrypt, and Asiacrypt Conferences. http://www.iacr.org/cd/ and http://dblp.uni-trier.de/db/conf/asiacrypt/index.html

· Journal of Cryptology. 1989-present. ISSN: 0933-2790.

· "Algorithms and Theory of Computation Handbook," ed. by Mikhail Atallah, CRC Press, 1999. ISBN: 0-8493-2649-4.

Other Excellent Sources

· Lecture Notes in Computer Science, Springer-Verlag. http://www.springerlink.com/content/105633/

· Conference Papers Online, Cryptography Research. http://www.cryptography.com/resources/papers/index.html

· International Association for Cryptologic Research. http://www.iacr.org/

· Cryptography and Security, by Ron L. Rivest. http://people.csail.mit.edu/rivest/crypto-security.html

· Index of Cryptography Papers Available Online, by Bruce Schneier. http://www.schneier.com/biblio/index.html

· "A Course in Number Theory and Cryptography," by Neal Koblitz, Springer-Verlag, 1994. ISBN: 0-3879-4293-9.

· IEEE Transactions on Information Theory. ISSN: 0018-9448.

Search The Infography
 
Advanced Search

   Page Through The Infography Alphabetically   
Crustacean Order Tanaidacea
   Cryptography
Cuba -- Politics

About The Infography
published by Fields of Knowledge


Clicking this button will display the HTML code.

"The Infography about Cryptography"
http://www.infography.com/content/401860581432.html
© 2009 Fields of Knowledge
Essex, Iowa 51638-4608 USA