Just click on a book cover to place an order with Amazon.com.
Applied Cryptography by Bruce Schneier:
This
book is probably the best introduction you will find to cryptography.
It starts with a well written and easily understandable description of
cryptographic protocols and key management. The following review of
cryptographic algorithms has an "admittedly" lean section on number
theory. However, this is followed by an exceptionally comprehensive
review of block and stream ciphers, pseudo-random number generators,
hash functions, public key algorithms and key exchange algorithms. The
final section briefly describes some specific cryptographic systems and
the politics surrounding cryptography in general.
Cryptography & Network Security by William Stallings:
This
award winning text book covers historical and modern cryptography. It
covers a wide range of topics such as: symmetric algorithms, public key
cryptography, hash algorithms, MAC algorithms, digital signatures and
authentication protocols. Also, as its name implies Network
Security issues such as e-mail security, local and internet security,
hackers, viruses, worms and firewalls.
Elliptic Curves in Cryptography by G. Seroussi, et al:
If
you want to write cryptographic algorithms, this is a good book to
have. The text is clear, current and concise. You start with the
basics, a review of groups, finite field arithmetic and arithmetic on
an Elliptic Curve; for both Odd Characteristic curves and
Characteristic Two. From there you move on to how to determine the
order of a group, Schoof's Algorithm and generating curves with Complex
Multiplication. Hyperelliptic Curves are briefly discussed at the end
of the book.
Handbook of Applied Cryptography by Alfred J. Menezes, et al:
The
"Handbook of Applied Cryptography" supplies a detailed and
comprehensive description of all but the most recent cryptographic
algorithms, protocols and issues. Thankfully, this book contains more
pros than the typical mathematical handbook without sacrificing
completeness.
ICSA Guide to Cryptography by Randall K. Nichols:
Implementing Elliptic Curve Cryptography by Michael Rosing:
A
very popular introduction to Elliptic Curve Cryptography. The author
takes the time to clearly explain Elliptic curve mathematics and
Protocols for both Odd Characteristic curves and Characteristic Two.
The numerous "C" code examples form a simple EC library from large
integer math to ECDSA signatures and more. This is a book
targeted at engineers and intentionally avoids the concise descriptions
and notation mathematicians may be used to.
Secrets and Lies by Bruce Schneier:
When
you're ready to step back, look at the big picture, and have some fun
try "Secrets and Lies" You'll practice putting yourself into the
criminals shoes to search for weaknesses in hardware, software and
wetware.
Smart Card Handbook by W. Rankl, W. Effing(Translator):
The
Smart Card Handbook starts with a description of the history of Smart
Cards and describes various types of Smart Cards. After the
introduction you'll read about Smart Card communication, security,
instructions and quality control. The Smart Card Handbook
finishes by covering Smart Card manufacturing, terminals and electronic
payment systems.