Skip to Main Content

Bulletin of the American Mathematical Society

The Bulletin publishes expository articles on contemporary mathematical research, written in a way that gives insight to mathematicians who may not be experts in the particular topic. The Bulletin also publishes reviews of selected books in mathematics and short articles in the Mathematical Perspectives section, both by invitation only.

ISSN 1088-9485 (online) ISSN 0273-0979 (print)

The 2020 MCQ for Bulletin of the American Mathematical Society is 0.84.

What is MCQ? The Mathematical Citation Quotient (MCQ) measures journal impact by looking at citations over a five-year period. Subscribers to MathSciNet may click through for more detailed information.

 

Book Review

The AMS does not provide abstracts of book reviews. You may download the entire review from the links below.


Full text of review: PDF   This review is available free of charge.
Book Information:

Author: Richard Mollin
Title: RSA and Public-Key Cryptography
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2003, xii + 291 pp., ISBN 1-58488-338-3, $79.95$

Authors: Hans Delfs and Helmut Knebl
Title: Introduction to Cryptography
Additional book information: Springer-Verlag, Berlin, 2002, xiv + 310 pp., ISBN 3-540-42278-1, $49.95$

Author: Douglas Stinson
Title: Cryptography: Theory and Practice
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2002, xxi + 339 pp., ISBN 1-58488-206-9, $79.95$

Author: Neal Koblitz
Title: Algebraic Aspects of Cryptography
Additional book information: Springer-Verlag, Berlin, 1998, ix + 206 pp., ISBN 3-540-63446-0, $79.95$

Author: Lawrence Washington
Title: Elliptic Curves: Number Theory and Cryptography
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2003, xi + 428 pp., ISBN 1-58488-365-0, $79.95$

Authors: Ian Blake, Gadiel Seroussi and Nigel Smart
Title: Elliptic Curves in Cryptography
Additional book information: Cambridge University Press, Cambridge, 1999, xv + 204 pp., ISBN 0-521-65374-6, $42.00$

Author: Oded Goldreich
Title: Modern Cryptography, Probabilistic Proofs and Pseudorandomness
Additional book information: Springer-Verlag, Berlin, 1999, xv + 182 pp., ISBN 3-540-64766-X, $97.00$

Author: Oded Goldreich
Title: Foundations of Cryptography: Basic Tools
Additional book information: Cambridge University Press, Cambridge, 2001, xix + 372 pp., ISBN 0-521-79172-3, $75.00$

Authors: Joan Daemen and Vincent Rijmen
Title: The Design of Rijndael: AES --- the Advanced Encryption Standard
Additional book information: Springer-Verlag, Berlin, 2002, ix + 238 pp., ISBN 3-540-42580-2, $44.95$

Authors: Alfred Menezes, Paul van Oorschot and Scott Vanstone
Title: Handbook of Applied Cryptography
Additional book information: CRC Press, Boca Raton, FL, 1997, xxviii + 780 pp., ISBN 0-8493-8523-7, $99.95$

References [Enhancements On Off] (What's this?)

1.
E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993. MR 95a:94007
2.
J. Black and H. Urtubia, ``Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption'', 11th USENIX Security Symposium, 2002, http://www.cs.colorado.edu/jrblack/papers.html
3.
I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, Cambridge University Press, 1999. MR 2001i:94048
4.
D. Bleichenbacher, B. Kaliski, J. Staddon, ``Recent Results on PCKS# 1: RSA Encryption Standard'', RSA Laboratories' Bulletin, Number 7, June 26, 1998.
5.
J. Daemen and V. Rijmen, The Design of Rijndael: AES -- the Advanced Encryption Standard, Springer-Verlag, 2002.
6.
H. Delfs and H. Knebl, Introduction to Cryptography, Springer-Verlag, 2002. MR 2003m:94060
7.
W. Diffie and M. Hellman, ``New Directions in Cryptography'', IEEE Transactions in Information Theory, Vol. IT-22, No. 6 (1976). MR 55:10141
8.
W. Diffie and M. Hellman, ``Exhaustive Cryptanalysis of the NBS Data Encryption Standard'', Computer, Vol. 10, No. 6, June 1977, pp. 74-84.
9.
J. Ellis, The Possibility of Secure Non-Secret Digital Encryption, GCHQ-CESG publication, January 1970.
10.
O. Goldreich, Modern Cryptography, Probabilistic Proofs, and Pseudorandomness, Springer-Verlag, 1999. MR 2000f:94029
11.
O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge Univ. Press, 2001. MR 2004a:94042
12.
C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 2002.
13.
N. Koblitz, Algebraic Aspects of Cryptography, Springer-Verlag, 1998. MR 2000a:94012
14.
Mitsuru Matsui, ``Linear Cryptanalysis Method for DES Cipher'', Eurocrypt '93, Springer-Verlag, 1994, pp. 386-397.
15.
K. McCurley, ``The Discrete Logarithm Problem'', in C. Pomerance, ed., Cryptology and Computational Number Theory, American Mathematical Society, Proceedings of Symposia in Applied Mathematics, Vol. 42, 1990, pp. 49-74. MR 92d:11133
16.
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997 (fifth printing, 2001). MR 99g:94015
17.
R. Merkle, ``Secure Communications over Insecure Channels'', Communications of the ACM, Vol. 21, No. 4 (1978), pp. 294-499.
18.
R. Mollin, RSA and Public-Key Cryptography, Chapman and Hall/CRC, 2003.
19.
National Security Agency, Committee on National Security Systems, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15, Fact Sheet 1, June 2003.
20.
C. Pomerance, ``A Tale of Two Sieves'', Notices of the American Mathematical Society, Vol. 43 (1996), pp. 1473-85. MR 97f:11100
21.
C. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, October 1949, pp. 656-716. MR 11:258d
22.
D. Stinson, Cryptography: Theory and Practice, Chapman and Hall/CRC, 2002. MR 2003c:94035
23.
United States Department of Commerce, National Bureau of Standards (1977), ``Data Encryption Standard'', Federal Information Processing Standard Publication No. 46.
24.
S. Vaudenay, ``Security Flaws Induced by CBC Padding -- Applications to SSL, IPSEC, WTLS, ...'', Eurocrypt 2002, Springer- Verlag, 2002, pp. 534-546.
25.
L. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman and Hall/CRC, 2003.

Review Information:

Reviewer: Susan Landau
Affiliation: Sun Microsystems
Email: susan.landau@sun.com
Journal: Bull. Amer. Math. Soc. 41 (2004), 357-367
Published electronically: February 24, 2004
Review copyright: © Copyright 2004 American Mathematical Society