· books · 29 min read

Discrete Logarithm Books

Are you looking for a deeper understanding of discrete logarithms? Look no further! In this book roundup article, we’ll be diving into the world of discrete logarithm books. From beginner-friendly introductions to advanced mathematical concepts, we’ve compiled a list of must-read books that will take you on a fascinating journey through the world of discrete logarithms.

As an Amazon™ Associate, we earn from qualifying purchases.



1. A Course in Number Theory and Cryptography

A Course in Number Theory and Cryptography | Cover Image

Discover the fascinating world of number theory and cryptography in this classic book by acclaimed mathematician Neal Koblitz. Written in a comprehensive and accessible language, this substantially revised and updated introduction dives into the ancient and modern techniques at the heart of cryptography applications.

No prior knowledge of algebra or number theory is required, making it an ideal starting point for those looking to delve into the field. The author emphasizes the algorithmic approach to the topic, estimating the efficiency of the techniques, and incorporates recent applications of elliptic curve theory.

With extensive exercises in every chapter, you can challenge yourself and test your understanding of the material. This volume also includes carefully graded answers to the exercises, providing invaluable support to those studying the concepts.

This book, now in its 25th year, serves as a testament to the timeless and relevant nature of arithmetic and cryptography. Join Koblitz as he illuminates the captivating mysteries hidden within the mathematical world and explore the practical applications of number theory.

Note: This book is a must-have for anyone looking into advanced topics of discrete logarithms, cryptography, and number theory. Don’t miss out on the chance to delve into the fascinating world of these mathematical topics.


  • Authors: Neal Koblitz

  • Publisher: Springer Science & Business Media

  • Published Date: September 02, 1994

  • Page Count: 258

  • Print Type: BOOK

  • Categories: Mathematics

  • Average Rating: 4.5

  • Ratings Count: 4.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



2. An Introduction to Formal Languages and Machine Computation

An Introduction to Formal Languages and Machine Computation | Cover Image

”An Introduction to Formal Languages and Machine Computation” is a comprehensive textbook that offers a concise and modern introduction to this complex and fascinating field. Written by renowned author Song Y. Yan, this book covers a wide range of topics in the theory of computation, including formal languages, automata theory, Turing machines, computability, complexity, number-theoretic computation, public-key cryptography, and even emerging models of computation such as quantum and biological computation.

To ensure a solid understanding of the subject, the book begins with a thorough introduction to the mathematical foundations essential to the field, including mathematical logic, set theory, graph theory, modern abstract algebra, and number theory. By doing so, it establishes a strong foundation for readers to engage with the more intricate topics that follow.

Catering to a wide audience, this book can function as a comprehensive textbook for undergraduate courses, a valuable resource for first-year graduate students, or a foundational book for professionals in the field. With its detailed and accessible explanations, “An Introduction to Formal Languages and Machine Computation” is sure to be a valuable asset for anyone looking to delve into the captivating world of formal languages and machine computation.


  • Authors: Song Y. Yan

  • Publisher: World Scientific

  • Published Date: March 30, 1998

  • Page Count: 424

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



3. Finite Fields: Theory and Computation

Finite Fields: Theory and Computation | Cover Image

The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography


”Finite Fields: Theory and Computation” is a groundbreaking mathematical treatise written by esteemed author Igor Shparlinski. With the subtitle “The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography, ” this comprehensive book explores the fascinating world of finite fields and their applications in various disciplines.

Shparlinski’s work delves into computational and algorithmic problems in finite fields, making it an invaluable resource for mathematicians, computer scientists, and researchers alike. From polynomial factorization, finding irreducible and primitive polynomials to constructing bases of various types, the book leaves no stone unturned.

To provide further depth, two special chapters are included on recent advances and applications of the theory of congruences and computational number theory. The book’s broad scope and in-depth analysis will be a treasure trove for those seeking to understand and explore the intricacies of finite fields.

”Finite Fields: Theory and Computation” holds a wealth of important results previously scattered across hard-to-find conference proceedings and journals. Notable among these is an extensive review of findings from Russia, which are less known to the broader mathematical community. A must-read for anyone with a passion for mathematics, this book is truly a meeting point of diverse topics and a testament to Shparlinski’s erudition in the field of finite fields.


  • Authors: Igor Shparlinski

  • Publisher: Springer Science & Business Media

  • Published Date: May 31, 1999

  • Page Count: 560

  • Print Type: BOOK

  • Categories: Mathematics

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



4. Internet Management

Internet Management | Cover Image

Internet Management is a comprehensive guide, offering a wealth of knowledge and expert advice for those looking to navigate the complex world of Internet management. With 50 insightful chapters, the book covers a range of topics from selecting the perfect Web database to understanding the implications and benefits of using CGI and GIF. Featuring fascinating case studies, hundreds of illustrations, and practical examples, this encyclopedic work is an essential tool for anyone managing Internet projects or looking to expand their digital knowledge.

Don’t miss your chance to unlock the secrets of successful Internet management.


  • Authors: Jessica Keyes

  • Publisher: CRC Press

  • Published Date: July 28, 1999

  • Page Count: 697

  • Print Type: BOOK

  • Categories: Computers

  • Average Rating: 5.0

  • Ratings Count: 21.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



5. Elliptic Curves

Elliptic Curves | Cover Image

Number Theory and Cryptography


”Elliptic Curves: Number Theory and Cryptography” is a groundbreaking work by Lawrence C. Washington that explores the captivating world of elliptic curves, their pivotal role in number theory, and their extraordinary applications in cryptography.

This book stands out as a rare gem in its field, as it is both comprehensive and accessible, assuming only a basic understanding of mathematics. As Washington delves into the mysterious realm of elliptic curves, readers will gain fascinating insights into the very heart of the subject – from its fundamental concepts to its cutting-edge practical applications.

With its crisp, concise writing and engaging style, “Elliptic Curves” is a must-read for anyone with an interest in computer science, number theory, or cryptography.


  • Authors: Lawrence C. Washington

  • Publisher: CRC Press

  • Published Date: May 28, 2003

  • Page Count: 446

  • Print Type: BOOK

  • Categories: Computers

  • Average Rating: 5.0

  • Ratings Count: 1.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



6. Computing and Combinatorics

Computing and Combinatorics | Cover Image

8th Annual International Conference, COCOON 2002, Singapore, August 15-17, 2002 Proceedings


”Computing and Combinatorics” is the proceeding of the 8th Annual International Computing and Combinatorics Conference, COCOON 2002, held in Singapore in August 2002. Edited by Oscar H. Ibarra and Louxin Zhang, this book consists of 60 revised full papers and three invited contributions, meticulously selected from 106 submissions after thorough review.

The papers are arranged in ten topical sections that cover a diverse range of subjects such as complexity theory, discrete algorithms, computational biology and learning theory, radio networks, automata and formal languages, Internet networks, computational geometry, combinatorial optimization, and quantum computing.

With a page count of 614, this book from Springer Publishers offers a comprehensive perspective on the field of computing and combinatorics, making it an essential read for researchers, professionals, and students in the field. The content covers the latest theories, applications, and advancements, making it a valuable resource for anyone interested in the intersection of these two domains.


  • Authors: Oscar H. Ibarra, Louxin Zhang

  • Publisher: Springer

  • Published Date: August 02, 2003

  • Page Count: 614

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



7. Information and Communication Security

Information and Communication Security | Cover Image

Second International Conference, ICICS’99 Sydney, Australia, November 9-11, 1999 Proceedings


ICICS’99 Sydney, Australia, saw the gathering of top researchers, designers, implementors, and users of information security systems and technologies. This groundbreaking conference focused on the latest advancements in the field, including security theory, system and protocol designs and implementations, and more.

With a range of presentations, panel discussions, and keynote speeches from world-renowned professionals, ICICS’99 offered attendees a unique opportunity to explore the intricacies and challenges in information and communication security. This invaluable Proceedings volume captures the conference’s most compelling insights, making it a must-read for anyone seeking to stay ahead in this rapidly evolving discipline.


  • Authors: Vijay Varadharajan, Yi Mu

  • Publisher: Springer

  • Published Date: June 01, 2004

  • Page Count: 328

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



8. Handbook of Elliptic and Hyperelliptic Curve Cryptography

Handbook of Elliptic and Hyperelliptic Curve Cryptography | Cover Image

The Handbook of Elliptic and Hyperelliptic Curve Cryptography is a comprehensive guide to the theory and applications of curve-based cryptography. This resource is a must-read for anyone looking to understand the intricacies of these cryptographic systems, which boast smaller key sizes and increased security compared to traditional cryptographic methods. Written by a team of esteemed experts, the book covers mathematical background, group operations, point counting, curve design, and implementation, as well as cryptanalysis, side-channel attacks, countermeasures, and (pseudo-)random number generation.

With its breadth of topics and thorough explanations, this handbook is an invaluable reference for anyone interested in elliptic and hyperelliptic curve cryptography.


  • Authors: Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, Frederik Vercauteren

  • Publisher: CRC Press

  • Published Date: July 19, 2005

  • Page Count: 842

  • Print Type: BOOK

  • Categories: Mathematics

  • Average Rating: 5.0

  • Ratings Count: 1.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



9. Prime Numbers

Prime Numbers | Cover Image

A Computational Perspective


Prime Numbers: A Computational Perspective is a comprehensive guide to understanding the fascinating world of prime numbers. Authored by renowned experts in the field, Richard Crandall and Carl Pomerance, this book bridges the gap between theoretical and computational aspects of prime numbers.

With an engaging mix of theoretical concepts, practical applications, and exercise sections, readers will find a wealth of interesting examples, pointers to the literature, and potential research projects. As leaders in their respective fields, the authors’ expertise makes this book a must-read for anyone interested in exploring the intricacies of prime numbers.


  • Authors: Richard Crandall, Carl Pomerance

  • Publisher: Springer Science & Business Media

  • Published Date: August 04, 2005

  • Page Count: 620

  • Print Type: BOOK

  • Categories: Mathematics

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



10. EBOOK: Cryptography & Network Security

EBOOK: Cryptography & Network Security | Cover Image

In “Cryptography & Network Security, ” FOROUZAN delves deep into the world of digital safety and explores the intricacies of cryptography and network security. Written for a wide range of readers, this comprehensive guide covers various topics, including digital signatures, authentication protocols, and secure protocols.

Dive into the fascinating world of cryptography and decryption where you’ll learn about symmetric, asymmetric, and public key encryption. Additionally, explore the intricacies of network security and discover the importance of secure protocols, such as the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL).

This EBOOK is more than just a simple security primer. It offers an in-depth understanding of the mathematical foundations behind cryptography, such as Lagrange’s interpolation theorem and elliptic curve cryptography. The author, FOROUZAN, takes you on an intellectual journey of cryptographic algorithms and their role in securing modern networks.

Whether you are a beginner looking to start your security career or a professional seeking to deepen your knowledge, “Cryptography & Network Security” is a must-read resource that won’t disappoint. Don’t leave your digital world vulnerable; let FOROUZAN’s expertise guide you to a safer cyber place.


  • Authors: FOROUZAN

  • Publisher: McGraw Hill

  • Published Date: February 28, 2007

  • Page Count: 754

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



11. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography | Cover Image

”Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography” is an authoritative work that presents innovative key establishment schemes using discrete logarithm cryptography. This book provides insights into two key standards, ANS X9.42 (Agreement of Symmetric Keys Using Discrete Logarithm Cryptography) and ANS X9.63 (Key Agreement and Key Transport Using Elliptic Curve Cryptography), developed by the Accredited Standards Committee (ASC) X9, Inc.

Written by esteemed authors Elaine Barker, National Institute of Standards and Technology (U. S. ), Don Johnson, and Miles Smid, this publication is an invaluable resource for professionals in the field of computer security and cryptography. With 114 comprehensive pages, this book delves deeply into the subject matter, offering a balanced blend of intrigue and information for readers.

Don’t miss out on this essential resource for those seeking a solid understanding of pair-wise key establishment schemes using discrete logarithm cryptography.


  • Authors: Elaine Barker, National Institute of Standards and Technology (U.S.), Don Johnson, Miles Smid

  • Publisher: Createspace Independent Pub

  • Published Date: March 30, 2007

  • Page Count: 114

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



12. Information Security Management Handbook

Information Security Management Handbook | Cover Image

Discover the definitive guide to information security with the gold-standard Information Security Management Handbook. Written by renowned experts Harold F. Tipton and Micki Krause, this essential reference is now in its sixth edition and offers readers a comprehensive understanding of the knowledge, skills, techniques, and tools required of IT security professionals.

Spanning over 3,200 pages and organized under the ISO/IEC 27001 Information Technology — Security Techniques, this 4-volume standalone reference is the ultimate authority on information security. With an emphasis on essential topics such as extranet, VPN, strong authentication, and access control, the handbook provides insights and best practices for securing your organization’s valuable data and assets.

The Information Security Management Handbook is an invaluable resource for IT professionals, security administrators, and anyone looking to deepen their understanding of information security. Whether you’re a seasoned professional or just starting your journey in this field, this comprehensive guide will equip you with the knowledge and tools needed to excel in the ever-evolving landscape of information security management.


  • Authors: Harold F. Tipton, Micki Krause

  • Publisher: CRC Press

  • Published Date: May 14, 2007

  • Page Count: 3280

  • Print Type: BOOK

  • Categories: Business & Economics

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



13. Introduction to Modern Cryptography

Introduction to Modern Cryptography | Cover Image

Principles and Protocols


Introduction to Modern Cryptography: Principles and Protocols is a comprehensive and rigorous guide to the world of cryptography. Written by renowned experts Jonathan Katz and Yehuda Lindell, this book provides an accessible yet precise treatment of modern cryptography, focusing on formal definitions, assumptions, and proofs.

Navigating the intricate and ever-evolving landscape of cryptography, the authors offer a groundbreaking introduction that covers essential concepts, protocols, and techniques. Readers will delve into the principles of cryptography, including public key systems, message authentication codes, and symmetric encryption. With a focus on the discrete logarithm problem as the base for cryptographic algorithms, the book also addresses two categories of algorithms for attacking the problem: generic and group-specific.

The authors’ expertise is evident as they cover essential topics like digital signatures, secure messaging systems, and the importance of key management. This well-rounded book serves as a valuable resource for students, researchers, and professionals seeking to gain a strong understanding of modern cryptography and its applications in computer security and networking.

With its engaging writing style and concise language, Introduction to Modern Cryptography: Principles and Protocols will help readers master the core principles of cryptography and grasp the evolving landscape of this critical discipline.


  • Authors: Jonathan Katz, Yehuda Lindell

  • Publisher: CRC Press

  • Published Date: August 31, 2007

  • Page Count: 548

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



14. Arithmetic of Finite Fields

Arithmetic of Finite Fields | Cover Image

Second International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings


Dive into the captivating world of finite fields with “Arithmetic of Finite Fields”, a comprehensive collection of refereed proceedings from the esteemed Second International Workshop held in Siena, Italy. This expertly curated volume of 16 full papers delves into a range of topics related to finite fields arithmetic, including structures, efficient algorithms, classifications and constructions, and their applications in cryptography and codes design. Don’t miss this invaluable resource for researchers and professionals in the field of computer science.


  • Authors: Joachim von zur Gathen, José Luis Imana

  • Publisher: Springer Science & Business Media

  • Published Date: June 25, 2008

  • Page Count: 214

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



15. Understanding Cryptography

Understanding Cryptography | Cover Image

A Textbook for Students and Practitioners


”Understanding Cryptography: A Textbook for Students and Practitioners” by Christof Paar and Jan Pelzl is the go-to guide for anyone looking to delve into the fascinating world of cryptography. In this comprehensive textbook, the authors cover everything from the essentials of applied cryptography to the practical implementations of modern cryptographic techniques.

Starting with the foundations of cryptography and data security, the book moves swiftly to provide a thorough understanding of stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and key establishment methods, including certificates and public-key infrastructure (PKI).

The authors, with a wealth of experience in teaching applied cryptography to students and professionals, make the subject accessible by focusing on the essentials and keeping the mathematics to a minimum. They offer numerous examples, problems, and chapter reviews to enhance understanding, and the book’s website provides additional resources such as slides, projects, and links to further information.

Suited for both graduate and advanced undergraduate courses, as well as self-study by engineers, “Understanding Cryptography” is an invaluable resource that provides a well-rounded understanding of cryptography, making it a must-read for anyone interested in this field.


  • Authors: Christof Paar, Jan Pelzl

  • Publisher: Springer Science & Business Media

  • Published Date: November 27, 2009

  • Page Count: 372

  • Print Type: BOOK

  • Categories: Computers

  • Average Rating: 5.0

  • Ratings Count: 5.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



16. Handbook of Information and Communication Security

Handbook of Information and Communication Security | Cover Image

The Handbook of Information and Communication Security is a comprehensive guide to understanding the complex world of information and communication security. With a focus on secure and accurate information transfer, this book delves into the concepts and methods employed to protect data and communications systems. From the Y2K issue to the events of 9/11, the history of information security comes to life through the authors’ expertise.

The Handbook is a must-read for anyone seeking a deep understanding of the technologies, systems, and best practices that safeguard our digital world. With a thorough analysis of security management and cryptographic techniques, this book is an essential resource for practitioners and students alike.


  • Authors: Peter Stavroulakis, Mark Stamp

  • Publisher: Springer Science & Business Media

  • Published Date: February 23, 2010

  • Page Count: 867

  • Print Type: BOOK

  • Categories: Technology & Engineering

  • Average Rating: 4.0

  • Ratings Count: 1.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



17. Encyclopedia of Information Assurance - 4 Volume Set (Print)

Encyclopedia of Information Assurance - 4 Volume Set (Print) | Cover Image

The Encyclopedia of Information Assurance: 4 Volume Set by Rebecca Herold and Marcus K. Rogers is an extensive, peer-reviewed compilation of articles and references written by industry experts. This essential resource covers a multitude of specializations related to information assurance, such as digital forensics, fraud examination, systems engineering, security risk management, and privacy, among others. With comprehensive coverage of key topics, this four-volume set serves as an indispensable tool for professionals in the field.

The encyclopedia covers everything from risk management and privacy to auditing and compliance, providing readers with the expertise needed to protect sensitive information, maintain critical system integrity, and defend against the latest threats. With invaluable examples, case studies, and discussions on common and emerging information assurance challenges, this authoritative reference is designed to help prevent misuse of data and stay ahead of evolving threats.

Furthermore, this Taylor & Francis encyclopedia is available online via subscription, offering additional advantages for researchers, students, and librarians. These benefits include citation tracking, active reference linking, saved searches, and the option to view content in both HTML and PDF formats. To learn more about subscription options and print/online combination packages, contact Taylor and Francis at e-reference@taylorandfrancis. com (US) or online. sales@tandf. co. uk (International).

The Encyclopedia of Information Assurance: 4 Volume Set is a must-have for professionals and students in fields related to information security, providing a wealth of knowledge to help tackle the ever-evolving landscape of information assurance.


  • Authors: Rebecca Herold, Marcus K. Rogers

  • Publisher: CRC Press

  • Published Date: December 22, 2010

  • Page Count: 3366

  • Print Type: BOOK

  • Categories: Computers

  • Average Rating: 5.0

  • Ratings Count: 3.0

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



18. Encyclopedia of Cryptography and Security

Encyclopedia of Cryptography and Security | Cover Image

Experience the ultimate resource in cryptography and security with the Encyclopedia of Cryptography and Security by renowned authors Henk C. A. van Tilborg and Sushil Jajodia, published by Springer Science & Business Media. This extensive reference guide covers all aspects of cryptography, from data protection and network security to operating systems security.

Designed for students, researchers, and professionals in need of reliable and quick information, this encyclopedia spans 1,457 pages, serving as a comprehensive yet accessible guide to the field. Dive into topics like stream ciphers, encryption methods, and various attack strategies, making it the essential go-to resource for anyone seeking knowledge in the world of cryptography and security.


  • Authors: Henk C.A. van Tilborg, Sushil Jajodia

  • Publisher: Springer Science & Business Media

  • Published Date: September 06, 2011

  • Page Count: 1457

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



19. Mathematics of Public Key Cryptography

Mathematics of Public Key Cryptography | Cover Image

Delve into the complex world of public key cryptography with “Mathematics of Public Key Cryptography” by Steven D. Galbraith.

This expertly-crafted advanced graduate textbook provides a comprehensive, insightful exploration of the fundamental principles and cutting-edge techniques in this high-demand field. With in-depth explanations, illustrations, and examples, this book is an essential resource for computer science students and professionals seeking to understand and master the intricacies of modern cryptography. As a publication from prestigious Cambridge University Press, readers can expect the highest quality content and presentation.

Don’t miss out on the opportunity to be part of the mathematical revolution in cryptography – immerse yourself in the world of public key cryptography with this exceptional textbook.


  • Authors: Steven D. Galbraith

  • Publisher: Cambridge University Press

  • Published Date: March 15, 2012

  • Page Count: 631

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



20. Applications of Finite Fields

Applications of Finite Fields | Cover Image

Experience the captivating world of finite fields with “Applications of Finite Fields”. Delving into the rich history of this branch of mathematics, this comprehensive book by renowned authors illustrates its revolutionary applications in coding theory and cryptography. Written for students, researchers, and practitioners in computer science, engineering, and mathematics, it covers diverse topics such as polynomial factorization, irreducible polynomials, and elliptic curve cryptosystems.

Don’t miss out on this invaluable resource for anyone eager to expand their knowledge in technology and engineering.


  • Authors: Alfred J. Menezes, Ian F. Blake, XuHong Gao, Ronald C. Mullin, Scott A. Vanstone, Tomik Yaghoobian

  • Publisher: Springer Science & Business Media

  • Published Date: April 17, 2013

  • Page Count: 229

  • Print Type: BOOK

  • Categories: Technology & Engineering

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



21. Advances in Cryptology – EUROCRYPT 2013

Advances in Cryptology – EUROCRYPT 2013 | Cover Image

32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings


The book, “Advances in Cryptology – EUROCRYPT 2013”, showcases the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques held in Athens, Greece, in May 2013. This event attracted 201 submissions, out of which 41 were carefully selected and reviewed to be included in this volume. The book delves into a wide array of topics, ranging from cryptanalysis of hash functions to digital signatures, public key encryption, and more.

It presents a comprehensive study on cryptographic techniques and their applications, making it a valuable resource for researchers, academics, and professionals in the field of computer science. Comprising 736 pages, this book is an essential addition to anyone’s library looking to stay informed and up-to-date on the latest advancements in cryptology.


  • Authors: Thomas Johansson, Phong Q. Nguyen

  • Publisher: Springer

  • Published Date: May 09, 2013

  • Page Count: 736

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



22. Handbook of Finite Fields

Handbook of Finite Fields | Cover Image

Discover the comprehensive guide to finite fields with the Handbook of Finite Fields. Edited by renowned researchers Gary L.

Mullen and Daniel Panario, this essential resource features state-of-the-art research from over 80 international contributors. This definitive handbook delivers cutting-edge information on the theory and applications of finite fields, providing an invaluable resource for professionals, academics, and students alike.

With its uniform style and format, the Handbook of Finite Fields is poised to become the leading reference in the field, offering unparalleled access to the latest advancements and insights.


  • Authors: Gary L. Mullen, Daniel Panario

  • Publisher: CRC Press

  • Published Date: June 17, 2013

  • Page Count: 1048

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



23. Authentication in Insecure Environments

Authentication in Insecure Environments | Cover Image

Using Visual Cryptography and Non-Transferable Credentials in Practise


In “Authentication in Insecure Environments, ” Sebastian Pape offers innovative solutions for secure authentication in scenarios where users may not trust their devices or want to be tracked. The book presents two distinct authentication issues and explores visual cryptography as a viable solution for secure authentication, even in situations where users cannot trust their devices due to malware.

Additionally, Pape discusses the use of anonymous credentials to prevent tracking and proposes an approach that combines biometrics and smartcards to prevent users from sharing their credentials. With a focus on the practical application of visual cryptography and non-transferable anonymous credentials, this comprehensive guide offers an in-depth insight into ensuring secure authentication in insecure environments.


  • Authors: Sebastian Pape

  • Publisher: Springer

  • Published Date: September 02, 2014

  • Page Count: 362

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



24. Computation, Cryptography, and Network Security

Computation, Cryptography, and Network Security | Cover Image

Computation, Cryptography, and Network Security is a comprehensive reference work that delves into various aspects of mathematical methods and theories in engineering sciences. Co-authored by Nicholas J. Daras and Michael Th. Rassias, this book serves as an invaluable resource for operations research analysts, engineers, community decision makers, academics, military personnel, and analysts from coalition partners. The contents cover a wide range of topics, including operations research, games and control theory, computational number theory and information security, and statistical modeling and applications, among others.

The authors aim to address the issues and provide methods for enhancing skills in analysis, assessment, and data management. This book is derived from the proceedings of a conference held in 2013 at the Hellenic Military Academy, reflecting an international and interdisciplinary approach. It discusses the latest developments and future trends in engineering sciences, offering both the theoretical background and practical applications of these advanced concepts.

The authors present numerous open questions and new future areas in the field, sparking curiosity and fostering innovation. This book features a strong focus on algorithms and techniques for solving complex problems, backed by extensive theoretical foundations. A substantial page count of 756 pages encapsulates the wealth of knowledge and expertise provided by these authors, ensuring a thorough understanding of the core principles and cutting-edge advancements.

Overall, Computation, Cryptography, and Network Security is an essential read for anyone seeking a comprehensive and up-to-date understanding of mathematical methods and their applications in engineering sciences, operations research, and cryptography.


  • Authors: Nicholas J. Daras, Michael Th. Rassias

  • Publisher: Springer

  • Published Date: September 16, 2015

  • Page Count: 756

  • Print Type: BOOK

  • Categories: Mathematics

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



25. Quantum Computational Number Theory

Quantum Computational Number Theory | Cover Image

Quantum Computational Number Theory by Song Y. Yan offers a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, with a focus on cryptography applications. The book guides readers through the development of fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems.

Key subjects include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture, and numerical verification. The author discusses quantum algorithms for addressing the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) in the context of attacking IFP, DLP, and ECDLP-based cryptographic systems. This self-contained book caters to graduate students, professionals in quantum computing, cryptography, and network security, and number theorists interested in the field.


  • Authors: Song Y. Yan

  • Publisher: Springer

  • Published Date: December 26, 2015

  • Page Count: 252

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



26. Cryptography

Cryptography | Cover Image

Theory and Practice


Cryptography: Theory and Practice, a comprehensive guide by Douglas Robert Stinson and Maura Paterson, is a must-read for anyone interested in the field. This fourth edition offers a detailed exploration of the fundamentals of cryptography while keeping up with the latest advances in the subject. With a new chapter on post-quantum cryptography, an expanded treatment of stream ciphers, and coverage of emerging techniques in messaging protocols, this book is perfect for both beginners and experienced professionals.

The authors also delve into the basics of cryptocurrencies and visual cryptography, providing a well-rounded understanding of cryptography in practice. Don’t miss out on this essential resource for anyone wanting to grasp the theories and applications of cryptography today.


  • Authors: Douglas Robert Stinson, Maura Paterson

  • Publisher: CRC Press

  • Published Date: August 14, 2018

  • Page Count: 408

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



27. Cryptology

Cryptology | Cover Image

Classical and Modern


Embark on a captivating journey through the world of cryptology with “Cryptology: Classical and Modern, ” as four accomplished authors lead you through the exciting and intriguing realm of codes and ciphers. This book is the essential guide for learners of any level, from cryptography beginners to advanced scholars.

The second edition of the book expertly explores topics ranging from classical methods, such as substitution, transposition, Alberti, Vigenère, and Hill ciphers, to modern methods, including RSA, ElGamal, and stream ciphers. Additionally, the authors delve into advanced concepts like the Diffie-Hellman key exchange and Advanced Encryption Standard. Along the way, they meticulously present the techniques for breaking both historical and contemporary methods, providing readers with a comprehensive understanding of the field.

This textbook is particularly suited for students, regardless of their technical background, offering an engaging blend of theory and practical applications. The authors also include valuable research exercises designed to supplement learning and promote a deeper understanding of cryptography. For students’ convenience, hints and answers to select exercises are available at the end of the book.

”Cryptology: Classical and Modern” is accessible to readers with no prior background in programming or college-level mathematics. Moreover, it provides insight into the historical and cultural importance of cryptography, illustrating its lasting impact on society through examples like the Enigma machine, Turing bombe, and Navajo code.

With a well-structured layout and a depth of content equivalent to a one-semester course, this book is indispensable for anyone looking to master the complexities of cryptology. So, dive in and explore the incredible world of codes and ciphers with “Cryptology: Classical and Modern” by your side.


  • Authors: Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon

  • Publisher: CRC Press

  • Published Date: December 07, 2018

  • Page Count: 482

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



28. Post-Quantum Cryptography

Post-Quantum Cryptography | Cover Image

12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings


Post-Quantum Cryptography is the proceedings of the 12th International Workshop held in Daejeon, South Korea, featuring papers from top cryptography experts. It covers cutting-edge research on quantum-resistant cryptography, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

The 25 full papers presented at this highly selective event provide a broad spectrum of the latest advancements in post-quantum cryptography. Join renowned authors and industry leaders delving into the future of secure transmission in an age of increasing quantum computing.


  • Authors: Jung Hee Cheon, Jean-Pierre Tillich

  • Publisher: Springer Nature

  • Published Date: July 15, 2021

  • Page Count: 502

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



29. Learning and Experiencing Cryptography with CrypTool and SageMath

Learning and Experiencing Cryptography with CrypTool and SageMath | Cover Image

Discover the fascinating world of cryptography with “Learning and Experiencing Cryptography with CrypTool and SageMath” by Bernhard Esslinger. This comprehensive guide offers a deep understanding of cryptography by bridging the gap between theory and practical application. From the basics of RSA to the latest NIST and BSI recommendations, learners of all levels can explore the intricacies of cryptography in a structured manner.

Experience hands-on learning with the ability to try out real-world examples using popular open-source tools such as CrypTool, SageMath, and OpenSSL. The book ensures its readers are well-equipped with the necessary knowledge to navigate the ever-evolving field of cryptography.

Unlike any other cryptography book currently available, this one provides explicit instructions on utilizing various tools for executing different cryptographic procedures. The target audience includes self-learners, students, developers, and professionals in the industry. All code samples provided are accompanied by a detailed appendix, teaching users how to harness these tools effectively.

The book caters to individual study with its chapter-wise independent structure, allowing for seamless diving into specific areas of interest. Additionally, a plethora of resources such as references, web links, and extensive footnotes are included, ensuring a comprehensive understanding of the subject matter.

”Learning and Experiencing Cryptography with CrypTool and SageMath” guarantees a captivating journey into the labyrinthine realm of cryptography. Don’t miss the opportunity to gain invaluable insights and practical experience under one accessible cover.


  • Authors: Bernhard Esslinger

  • Publisher: Artech House

  • Published Date: December 31, 2023

  • Page Count: 665

  • Print Type: BOOK

  • Categories: Computers

  • Maturity Rating: NOT_MATURE

  • Language: en


🎧 Listen Free on Amazon Audible

📱 Read Free on Amazon Kindle Unlimited



That’s All Folks!


As an Amazon™ Associate, we earn from qualifying purchases.

    Share:
    Back to Blog