Here are 29 books that Foundations of Cryptography fans have personally recommended if you like
Foundations of Cryptography.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.
This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.
It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type httpsinto my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?
It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…
The Victorian mansion, Evenmere, is the mechanism that runs the universe.
The lamps must be lit, or the stars die. The clocks must be wound, or Time ceases. The Balance between Order and Chaos must be preserved, or Existence crumbles.
Appointed the Steward of Evenmere, Carter Anderson must learn the…
I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!
When I take this book off my shelf, the probability that I find the answer I'm looking for is very high. Yes, it's a big book, and I'm pretty sure I haven't read every single page yet, but because of its broad coverage of security engineering knowledge, from crypto to real-world processes, it is an invaluable reference for teaching and practical cyber security.
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic
In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.
This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…
I am an academic researcher and an avid non-fiction reader. There are many popular books on science or music, but it’s much harder to find texts that manage to occupy the space between popular and professional writing. I’ve always been looking for this kind of book, whether on physics, music, AI, or math – even when I knew that as a non-pro, I wouldn’t be able to understand everything. In my new book I’ve been trying to accomplish something similar: A book that can intrigue readers who are not professional economic theorists, that they will find interesting even if they can’t follow everything.
A simple (not perfect) test of whether you’re going to love this book: Just check out the author’s blog, called “shtetl-optimized”. The style is similar: sharp, funny, mixing professional theoretical Computer Science with broader takes.
I am still in the middle of the book, and nevertheless, I’m happy to recommend it. As an amateur with superficial CS knowledge, I am enjoying this introduction to classical complexity theory and the basic theory of quantum computation.
Aaronson’s distinctive style makes the ride all the more enjoyable. It’s neither a “real” textbook nor a pop-science book. It’s in a weird space somewhere in between, and I love it!
Written by noted quantum computing theorist Scott Aaronson, this book takes readers on a tour through some of the deepest ideas of maths, computer science and physics. Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible…
Magical realism meets the magic of Christmas in this mix of Jewish, New Testament, and Santa stories–all reenacted in an urban psychiatric hospital!
On locked ward 5C4, Josh, a patient with many similarities to Jesus, is hospitalized concurrently with Nick, a patient with many similarities to Santa. The two argue…
I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.
Although David is a friend, I only recommend his book because it’s great, both in terms of content and presentation. Real-World Cryptography is today’s reference book about cryptographic tools and applications: Modern schemes such as the SHA-3 hash function and the Noise protocol framework, end-to-end encryption protocols, cryptocurrencies’ cryptography mechanisms, as well as emerging techniques like fully-homomorphic encryption and multi-party computation; Wong’s book delivers a practice-oriented, accessible introduction, enriched by many visual illustrations (including original comics strips!), and exercises (with their solutions).
If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging…
As a computer science professor and educator, my teaching motto is Rigor and Vigor. I believe that the only way to learn something deeply, whether it's an abstract mathematical argument or a complex computer system – is building the thing from the ground up, from first principles. That's the rigor. The second requirement – vigor – comes from the need to make this learning experience captivating, rewarding, empowering. I spent much of my career developing books, courses, and games that help learn computer science and mathematics with gusto. I am pleased that this work has had an impact, and that it resonates with many students and self-learners around the world.
This popular book takes a broad perspective that surveys the main physical and logical layers from which all digital devices are made.
I like the accessible writing style, aimed at lay readers, and the book’s companion website, where one can experiment interactively with many of the artifacts described in the book. The second edition includes a new section that focuses on a functional subset of Intel 8080, the microprocessor that ushered the personal computing revolution, and the instruction set used by many PCs and servers today.
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological innovations of the past two centuries.
Using everyday objects and familiar language systems such as Braille and Morse code, author Charles Petzold weaves an illuminating narrative for anyone who's ever wondered about the secret inner life of computers and other smart machines.
My primary interest is in brain function. Because the principal job of
the brain is to process information, it is necessary to define exactly
what information is. For that, there is no substitute for Claude
Shannon’s theory of information. This theory is not only quite
remarkable in its own right, but it is essential for telecoms,
computers, machine learning (and understanding brain function).
I have written ten "tutorial introduction" books, on topics which vary
from quantum mechanics to AI.
In a parallel universe, I am still an Associate Professor at the
University of Sheffield, England.
This is a more comprehensive and mathematically rigorous book than Pierce’s book. For the novice, it should be read-only after first reading Pierce’s more informal text. Due to its vintage, the layout is fairly cramped, but the content is impeccable. At almost 500 pages, it covers a huge amount of material. This was my main reference book on information theory for many years, but it now sits alongside more recent texts, like MacKay’s book (see below). It is also published by Dover, so it is reasonably priced.
Written for an engineering audience, this book has a threefold purpose: (1) to present elements of modern probability theory — discrete, continuous, and stochastic; (2) to present elements of information theory with emphasis on its basic roots in probability theory; and (3) to present elements of coding theory. The emphasis throughout the book is on such basic concepts as sets, the probability measure associated with sets, sample space, random variables, information measure, and capacity. These concepts proceed from set theory to probability theory and then to information and coding theories. No formal prerequisites are required other than the usual undergraduate…
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
This is a very short (of course!) introduction to cryptography, but it is masterful in its concise conveyance of all that really matters on this topic. I have no hesitation in admitting a close relationship with both authors, but most particularly Fred Piper, who was my doctoral supervisor. Fred has been a mentor throughout my professional life, and this book presents his take on the crucial components of modern cryptography, written for a general audience. I’ve seen this book in airport bookshops and thought `how cool – you can buy a book on cryptography that is written so well you could read it on a plane!’ I have now written two books about cryptography that are less short, and might need longer plane journeys, but Cryptography: A Very Short Introduction remains an inspiration to me.
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.
ABOUT THE SERIES: The Very Short Introductions series from Oxford University…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
I always knew cryptography was political, but I had no idea how political until I read this book. Seeing the subject I am so fascinated by through the words of a political journalist was truly eye-opening. Steven Levy navigates a deeply fascinating period in modern technological history – the late twentieth-century battles between governments trying to maintain power and control over communications, and technologists who saw the fledgling internet as an opportunity to build a new world. Cryptography, which protects digital communications, sat plum on the frontline between these two communities, hence battles over cryptography turned into so-called 'crypto wars’ (although nobody died). Nobody who read this book was surprised with much that Edward Snowden had to say to the world in 2013 – Snowden was just reportage of the latest chapter in the same ongoing conflict.
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the…
The defining event in my parents’ lives, World War II has always been in my blood. When I was growing up, it would surface now and again when old comrades came to visit or when we came across souvenirs from the war. My favorite was a carefully etched German map showing sea lanes in the Caribbean, exotic and somehow menacing at the same time. My curiosity piqued, I knew I wanted to be in the thick of history—which meant reading and writing about the war, getting my PhD in history, and becoming a Marine and an intelligence officer.
David was a pioneer. Before Codebreakers there was next to nothing in print about codebreaking. Focused on World War II, he introduced a generation of readers to a secret realm, inviting us to look behind the big green door for the first time. This generous and loyal friend alerted me to the need for comprehensive overview of American intelligence in World War II.
Codebreaking is the most important form of secret intelligence in the world. It produces much more and more trustworthy information than spies, and this intelligence exerts great influences upon the policies of governments.
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I write historical nonfiction, I’m an avid reader, and I’ve long been fascinated by the past. But I’m far less interested in the stories of powerful people, political intrigues, and significant battles. I would rather read (and write) hidden history: the stories that have not yet been discovered or fully explored and stories that are left out of history books—accidentally or deliberately. I find these far more compelling. They often provide a deeper look at how history affects those who lack power, influence, and money but who nevertheless do remarkable and often heroic things. I live in Portugal and have started working on a new historical nonfiction book.
In 2018, I went to an author reading by Liza Mundy. Deep into researching my own nonfiction book, I was fascinated as Mundy talked about interviewing women who became code breakers in World War II.
The government recruited them from top colleges and universities, looking for women who were gifted in math and music. The women were sworn to secrecy and kept their word, telling people they had been secretaries during the war. They maintained that fiction into their old age or their graves.
Mundy tracked down survivors and showed them documentation that the program had been declassified. They had been released from their vow of silence and could share their stories with her. The book is excellent.
An expert on East European politics and economics analyzes and evaluates Western policies toward the new East European democracies as they struggle to build stable political orders and functioning market economies. He argues that the West must give higher priority to assisting the region and reorient its strategies so as to emphasize the political and administrative dimensions of economic reconstruction. He reviews the economic legacy of past Western policies and of Eastern Europe's previous dependency on the Soviet Union, and then examines in detail the changing East-West trade patterns, the prospect for Western investment and technology transfer, the questions of…