Search The Infography: 
The Infography


The following sources are recommended by a professor whose research specialty is cryptography.


Six Superlative Sources

· "Cryptography: Theory and Practice," by Douglas Stinson, CRC Press, 1995. ISBN: 0-8493-8521-0.

· "Applied Cryptography, Second Edition," by Bruce Schneier, John Wiley and Sons, 1996. ISBN: 0-471-11709-9.

· "Handbook of Applied Cryptography," by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, CRC Press, 1996. ISBN: 0-8493-8523-7.

· Proceedings of the Crypto, Eurocrypt, and Asiacrypt Conferences. and

· Journal of Cryptology. 1989-present. ISSN: 0933-2790.

· "Algorithms and Theory of Computation Handbook," ed. by Mikhail Atallah, CRC Press, 1999. ISBN: 0-8493-2649-4.

Other Excellent Sources

· Lecture Notes in Computer Science, Springer-Verlag.

· Conference Papers Online, Cryptography Research.

· International Association for Cryptologic Research.

· Cryptography and Security, by Ron L. Rivest.

· Index of Cryptography Papers Available Online, by Bruce Schneier.

· "A Course in Number Theory and Cryptography," by Neal Koblitz, Springer-Verlag, 1994. ISBN: 0-3879-4293-9.

· IEEE Transactions on Information Theory. ISSN: 0018-9448.

Search The Infography
Advanced Search

   Page Through The Infography Alphabetically   
Crustacean Order Tanaidacea
Cuba -- Politics

About The Infography
published by Fields of Knowledge

Clicking this button will display the HTML code.

"The Infography about Cryptography"
© 2009 Fields of Knowledge
Essex, Iowa 51638-4608 USA