Books on Cryptography .

Mathematics and Cryptography

Algebra for Cryptologists
A. R. Meijer, Springer; Edición: 1st ed. 2016 (2 de septiembre de 2016).
Boolean Functions and Their Applications in Cryptography
C.K. Wu, D. Feng, Springer 2016.
Homomorphic Encryption and Applications
X. Yi, R. Paulet, E. Bertino, Springer 2014.
Open Problems in Mathematics and Computational Science
K. Koç , Springer 2014.
Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday.
M. Fischlin, S. Katzenbeisser, Springer 2013.
Algebraic Curves in Cryptography
S. Ling, H. Wang, C. Xing, CRC Press 2013.
An Introduction to Number Theory with Cryptography
J. S. Kraft, L. C. Washington, Chapman and Hall/CRC, 2013.
Computational Number Theory and Modern Cryptography
S. Y. Yan, Wiley 2013.
Mathematics of Public Key Cryptography
S. D. Galbraith, Cambridge University Press 2012.
Identity-Based Encryption
S. Chatterjee, P. Sakar, Springer 2011.
Chaos Based Cryptography
L. Kocarev, S. Lian, Springer, 2011.
Gröbner Bases, Coding and Cryptography
M. Sala, T. Mora, L. Perret, S. Sakata, C. Traverso, Springer, 2009.
Finite Automata and Application to Cryptography
R. Tao, Springer, 2009.
Elementary Number Theory: Primes, Congruences, and Secrets
W. Stein, Springer, 2009.
Algebraic Geometry in Coding Theory and Cryptography
H. Niederreiter, C. Xing, Chapman and Hall/CRC, 2009.
Elliptic Curves: Number Theory and Cryptography
L. C. Washigton, Springer, Chapman and Hall/CRC, 2008.
Identity-Based Cryptography
M. Joye, G. Neven, IOS Press, 2008.
Introduction to Identity-Based Encryption
L. Martin, Artech House, 2008.
Group-based Cryptography
A. Myasnikov, V. Shpilrain, A. Ushakov,Birkhäuser , 2008.
Handbook of Elliptic and hyperelliptic Curve Cryptography
H. Cohen, G. Frey, Chapman & Hall/CRC, 2006.
Algebraic Aspect of the Advanced Encryption Standard
C. Cid, S. Murphy, M. Robshaw, Springer, 2006.
Advances in Elliptic Curve Cryptography
I. Blake, G. Seroussi, N. Smart, Cambridge University Press, 2005.
Guide to Elliptic Curve Cryptography
D. Hankerson, A. Menezes, S. Vanstone, Springer, 2004.
Elliptic Curves in Cryptography
I. Blake, G. Seroussi, N. Smart, Cambridge University Press, 1999.
Algebraic Aspects of Cryptography
N. Koblitz, Springer, 1999.
A Course in Number Theory and Cryptography
N. Koblitz, Springer, 1994.

General Cryptography

S. Rubinstein-Salzedo, Springer; Edición: 1st ed. 2018 (28 de septiembre de 2018).
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
P.Y.A. Ryan, D. Naccache, J. Quisquater, Springer 2016.
Cryptography Made Simple
N. P. Smart, Springer 2015.
Introduction to Modern Cryptography
J. Katz, Y. Lindell, CRC Press 2014.
Introduction to Public Key Infrastructures
J. A. Buchmann, E. Karatsiolis, A. Wiesmaier, Springer 2013.
Introduction to Cryptography with Maple
J.L. Gómez Pardo, Springer 2013.
A Brief History of Cryptology and Cryptographic Algorithms
J. F. Dooley, Springer 2013.
Understanding Cryptography
C. Paar, J. Pelzl, Springer 2010.
An Introduction to Mathematical Cryptography
J. Hoffstein, J. Pipher, J. H. Silverman, Springer, 2008.
Introduction to Cryptography
H. Delfs, H. Knebl, Springer, 2007.
Computer Security and Cryptography
A. G. Konheim, Wiley, 2007.
Classical Introduction To Cryptography Exercise Book
T. Baignères, P. Junod, Y. Lu, J. Monnerat, S. Vaudenay, Sringer, 2006.
Cryptography, Theory and Practice
D. R. Stinson, Chapman & Hall/CRC, 2006.
Cryptography and Introduction
N. Smart, Mcgraw-Hill College, 2004.
User's Guide to Cryptography and Standards
A. W. Dent, C. J. Mitchell, Artech House, 2005.
Encyclopedia of Cryptography and Security
H. C. Tilborg, Springer, 2005.
Decrypted Secrets. Methods and Maxims of Cryptology
F.L. Bauer, Springer, 1997.
Handbook of Applied Cryptography
A.J. Menezes, P.C. van Oorschot, S. A. Vanstone, CRC Press, 1996.

Fundamental and Theoretical Cryptography

Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich (Information Security and Cryptography)
Y. Lindell (Editor), Springer; Edición: 1st ed. 2017 (6 de abril de 2017).
Cryptography in Constant Parallel Time
B. Applebaum, Springer, 2014.
Operational Semantics and Verification of Security Protocols
C. Cremers, S. Mauw, Springer, 2012.
Engineering Secure Two Party Computation Protocols
T. Schneider, Springer, 2012.
Cryptographic Protocol
L. Dong, K. Chen, Springer, 2012.
Black-Box Models of Computation in Cryptology
T. Jager, Springer, 2012.
Efficient Secure Two-Party Protocols: Techniques and Constructions
C. Hazay, Y. Lindell, Springer, 2010.
Introduction to Modern Cryptography
J. Katz, Y. Lindell, Chapman & Hall/CRC, 2008.
Principles of Protocol Design
R. Sharp, Springer, 2008.
Formal Correctness of Security Protocols
G. Bella, Springer, 2007.
Concurrent Zero Knowledge
A. Rosen, Springer, 2006.
Complexity and Cryptography, An Introduction
J. Talbot, D. Welsh, Cambridge University Press, 2006.
Contemporary Cryptology
D. Catalano, R. Cramer, I. Damgård, G. D. Crescenzo, D. Pointcheval, T. Takagi, Springer, 2005.
Complexity Theory and Cryptology. An Introduction to Cryptocomplexity
J. Rothe , Springer, 2005.
Protocols for Authentication and Key Establishment
C. Boyd, A. Mathuria, Springer, 2003.
Fundations of Cryptography
O. Goldreich, Cambridge University Press, 2001.
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
O. Goldreich, Springer, 1999.

Applied Cryptography

Computation, Cryptography, and Network Security
N. J. Daras, M. Rassias, Springer, 2015.
Guide to Security Assurance for Cloud Computing
S.Y. Zhu, R.Hill, M. Trovati, Springer, 2015.
Understanding Bitcoin
P. Franco, Wiley, 2015.
Cryptogrphy in Constant Parallel Time
B. Applebaum, Springer, 2014.
Visual Cryptography for Image Processing and Security
F. Liu, W.Q. Yan, Springer, 2014.
Secure Smart Embedded Devices, Platforms and Applications
K. Markantonakis, K. Mayes, Springer, 2014.
Hardware Security: Design, Threats, and Safeguards
D. Mukhopadlhyay, R. S. Chakraborty, CRC Press, 2014.
Algebraic Circuits
A. Lloris, E. Castillo, L. Parrilla, A. García, Springer, 2014.
Security and Privacy in Social Networks
Y. Altshuler, Y. Elovici, A. B. Cremers, N. Aharony, A. Pentland, Springer, 2013.
Security and Privacy in Mobile Social Networks
X. Liang, R. Lu, X. Lin, X. Shen, Springer, 2013.
Security and Privacy in Biometrics
P. Campisi, Springer, 2013.
Image Encryption: A Communication Perspective
F. El-Samie, H. Ahmed, I. Elashry, M. Shahieen, O. Faragallah, E. El-Rabaie, S. Alshebeili, CRC Press, 2013.
Introduction to Hardware Security and Trust
M. Tehranipoor, C. Wang, Springer, 2012.
Security for Wireless Sensor Networks using Identity-Based Cryptography
H. K. Patil, S. A. Szygenda, CRC Press, 2012.
Visual Cryptography and Secret Image Sharing
S. Cimato, C. Yang, CRC Press, 2012.
Securing Digital Video
E. Diehl, Springer, 2012.
Security Trends for FPGAS
B. Badrignans, J. Danger, V. Fischer, G. Gogniat, L. Torres, Springer, 2011.
Applied Cryptography for Cyber Security and Defense
H. Nemati, L. Yang, Information Science Reference, 2011.
Implementing SSL/TLS
J. Davies (Author), Wiley; Edición: 1 (11 de enero de 2011).
Towards Hardware-Intrinsic Security
A. Sadeghi, D. Naccache, Springer, 2010.
Secure Integrated Circuits and Systems
I. Verbauwhede, Springer, 2010.
Practical Signcryption
A. W. Dent, Y. Zheng, Springer, 2010.
Digital Signatures
J. Katz, Springer, 2010.
Securing Wireless Communications at the Physical Layer
R. Liu, W. Trappe, Springer, 2010.
Security in Embedded Devices
C. Gebotys, Springer, 2010.
Encryption for Digital Content
A. Kiayias, S. Pehlivanoglu, Springer, 2010.
Cryptography Engineering, Design Principles and Practical Applications
N. Ferguson, B. Schneier, T. Kohno, Wiley Publishing, 2010.
Cryptographic Engineering
C. Kaya K., Springer, 2009.
Security Engineering for Vehicular IT Systems: Improving the Trustworthiness and Dependability of Automotive IT Applications
M. Wolf, Vieweg+Teubner Verlag, 2009.
Understanding and Applying Cryptography and Data Security
A. J. Elbirt, CRC Press, 2009.
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
J. A. Onieva (Author), J. Zhou (Author), Springer; Edición: 1st Edition. 2nd Printing. 2008 (2 de diciembre de 2008).
Networked RFID Systems and Lightweight Cryptography
P.H. Cole, D. C. Ranasinghe, Springer, 2008.
Secure Systems Development with UML
J. Jürjens, Springer, 2005.
Cryptographic Security Architecture
P. Gutmann, Springer, 2004.
Internet Security, Cryptography principles, algorithms and protocols
M. Y. Rhee, Wiley, 2003.
Network Security with OpenSSL
J. Viega , M. Messier, P. Chandra , Wiley, 2003.

Symetric Cryptography

Security of Block Ciphers: From Algorithm Design to Hardware Implementation
K. Sakiyama, Y. Sasaki, Y. Li Wiley, 2016.
The Hash Function BLAKE
J. Aumasson, W. Meier, R. Phan, L. Henzen, Springer, 2014.
Symmetric Cryptographic Protocols
M. Ramkumar (Author), Springer; Edición: Softcover reprint of the original 1st ed. 2014 (28 de octubre de 2016)
Stream Ciphers
A. Klein, Springer, 2013.
A survey on Block Cipher Modes of Operation: their differences and possible applications
A. Gabriel, LAP LAMBERT Academic Publishing, , 2012.
RC4 Stream Cipher and Its Variants
G. Paul, S. Maitra, CRC Press, 2012.
Advanced Linear Cryptanalysis of Block and Stream Ciphers
P.Junod , A. Canteaut, IOS Press, 2011.
The Block Cipher Companion
L. R. Knudsen, M. Robshaw, IOS Press, 2011.
Hard Disk Encryption with Block Ciphers: Common Attacks and Modes of Operation
T. Wenninger, VDM Verlag, 2010.
Novel Design of Block Cipher Cryptosystem: Analysis, Design and Implementation
K. C. Leung, VDM Verlag, 2009.
New Stream Cipher Designs: The eSTREAM Finalists
M. Robshaw, O. Billet, Springer, 2008.
Data-driven Block Ciphers for Fast Telecommunication Systems
N. Moldovyan, A. Moldovyan, Auerbach Publication, 2007.
The Design of RijndaeL: AES - The Advanced Encryption Standard
J. Daemen, V. Rijmen, Springer, 2002.


Timing Channels in Cryptography: A Micro-Architectural Perspective
C. Rabeiro, D. Mukhopadhyay, S. Bhattacharya, Springer, 2015.
Why Cryptography Should Not Rely on Physical Attack Complexity
J. Krämer, Springer, 2015.
Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits
E. Peeters, Springer, 2013 .
Quantum Attacks on Public-Key Cryptosystems
S. Y. Yan, Springer, 2013.
Faul Analysis in Cryptography
M. Joye, M. Tunstall, Springer, 2012.
Advanced Statistical Steganalysis
R. Böhme, CRC Press , 2010.
Power Analysis Side Channel Attacks: The Processor Design-level Context
J. Ambrose, A. Ignjaatovic, S. Parameswaran, VDM Verlag Dr. Müller , 2010.
Algorithmic Cryptanalysis
A. Joux, CRC Press , 2009.
Algebraic Cryptanalysis
G. Bard, Springer, 2009.
Modern Cryptanalysis: Techniques for Advanced Code Breaking
C. Swenson, Wiley, 2008.
Power Analysis Attacks: Revealing the Secrets of Smart Cards
S. Mangard, E. Oswald, T. Popp, Springer, 2007.
Applied Cryptanalysis
M. Stamp, R. M. Low, Wiley, 2007.

Quantum and Post-Quantum Cryptography

Physical and Data-Link Security Techniques for Future Communication Systems
M. Baldi, S. Tomasin, Springer, 2016.
Principles and Methods of Quantum Information Technologies
Y. Yamamoto, K. Semba, Springer, 2016.
Quantum Computational Number Theory
S. Y. Yan, Springer , 2015.
Post-Quantum Cryptography: Code-based Cryptography and Hash Based Signatures Schemes
V. Gauthier Umaña, Scholars' Press, 2014.
Introduction to the Theory of Quantum Information Processing
J. A. Bergou, M. Hillery, Springer 2013.
Quantum Attacks on Public Key Cryptography
S. Y. Yan, Springer 2013.
Lattices Basis Reduction
M. Bremner, CRC Press, 2012.
Applied Quantum Cryptography
C. Kollmitzer, M. Pivk (editors), Springer, 2010.
The LLL Algorithm
P.Q. Nguyen, B.Vallée, Springer 2010.
Post-Quantum Cryptography
D. J. Bernstein, J. Buchmann, E. Dahmen, Springer, 2009.
Quantum Cryptography and Secret Key Distillation
G. V. Assche, Cambridge Press, 2006.
Quantum Communications and Cryptography
A. V. Sergienko, CRC Press, 2006.

History of Cryptography

History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms (History of Computing)
J. F. Dooley, Springer; Edición: 1st ed. 2018 (24 de agosto de 2018).
Unraveling the Voynich Codex
J. Janick, A. O. Tucker, Springer; Edición: 1st ed. 2018 (16 de agosto de 2018).
The Secret History of World War II: Spies, Code Breakers, and Covert Operations
N. Kagan, S. G. Hyslop (Authors), K. W. Rendell (Foreword) , National Geographic (25 de octubre de 2016).
Secret History The Story of Cryptology
C. P. Bauer, Chapman and Hall/CRC; Edición: 1 (25 de marzo de 2013).
A Brief History of Cryptology and Cryptographic Algorithms
J. F. F. Dooley, Springer; Edición: 2013 (24 de septiembre de 2013).
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
S. Singh, Anchor; Edición: Reprint (29 de agosto de 2000).
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
D. Kahn, Scribner; Edición: Rev Sub (5 de diciembre de 1996).


send suggestions to: José de Jesús Angel Angel
email: jjaa(at)

replace (at) by @