Remote Access Bulletin of the American Mathematical Society

Bulletin of the American Mathematical Society

ISSN 1088-9485(online) ISSN 0273-0979(print)

Book Review

The AMS does not provide abstracts of book reviews. You may download the entire review from the links below.


Full text of review: PDF   This review is available free of charge.
Book Information:

Author: Richard Mollin
Title: RSA and Public-Key Cryptography
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2003, xii + 291 pp., ISBN 1-58488-338-3, $79.95

Authors: Hans Delfs and Helmut Knebl
Title: Introduction to Cryptography
Additional book information: Springer-Verlag, Berlin, 2002, xiv + 310 pp., ISBN 3-540-42278-1, $49.95

Author: Douglas Stinson
Title: Cryptography: Theory and Practice
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2002, xxi + 339 pp., ISBN 1-58488-206-9, $79.95

Author: Neal Koblitz
Title: Algebraic Aspects of Cryptography
Additional book information: Springer-Verlag, Berlin, 1998, ix + 206 pp., ISBN 3-540-63446-0, $79.95

Author: Lawrence Washington
Title: Elliptic Curves: Number Theory and Cryptography
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2003, xi + 428 pp., ISBN 1-58488-365-0, $79.95

Authors: Ian Blake, Gadiel Seroussi and Nigel Smart
Title: Elliptic Curves in Cryptography
Additional book information: Cambridge University Press, Cambridge, 1999, xv + 204 pp., ISBN 0-521-65374-6, $42.00

Author: Oded Goldreich
Title: Modern Cryptography, Probabilistic Proofs and Pseudorandomness
Additional book information: Springer-Verlag, Berlin, 1999, xv + 182 pp., ISBN 3-540-64766-X, $97.00

Author: Oded Goldreich
Title: Foundations of Cryptography: Basic Tools
Additional book information: Cambridge University Press, Cambridge, 2001, xix + 372 pp., ISBN 0-521-79172-3, $75.00

Authors: Joan Daemen and Vincent Rijmen
Title: The Design of Rijndael: AES --- the Advanced Encryption Standard
Additional book information: Springer-Verlag, Berlin, 2002, ix + 238 pp., ISBN 3-540-42580-2, $44.95

Authors: Alfred Menezes, Paul van Oorschot and Scott Vanstone
Title: Handbook of Applied Cryptography
Additional book information: CRC Press, Boca Raton, FL, 1997, xxviii + 780 pp., ISBN 0-8493-8523-7, $99.95

References [Enhancements On Off] (What's this?)

  • 1. Eli Biham and Adi Shamir, Differential cryptanalysis of the data encryption standard, Springer-Verlag, New York, 1993. MR 1254656
  • 2. J. Black and H. Urtubia, ``Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption'', 11th USENIX Security Symposium, 2002, http://www.cs.colorado.edu/jrblack/papers.html
  • 3. I. F. Blake, G. Seroussi, and N. P. Smart, Elliptic curves in cryptography, London Mathematical Society Lecture Note Series, vol. 265, Cambridge University Press, Cambridge, 2000. Reprint of the 1999 original. MR 1771549
  • 4. D. Bleichenbacher, B. Kaliski, J. Staddon, ``Recent Results on PCKS# 1: RSA Encryption Standard'', RSA Laboratories' Bulletin, Number 7, June 26, 1998.
  • 5. J. Daemen and V. Rijmen, The Design of Rijndael: AES -- the Advanced Encryption Standard, Springer-Verlag, 2002.
  • 6. Hans Delfs and Helmut Knebl, Introduction to cryptography, Information Security and Cryptography, Springer-Verlag, Berlin, 2002. Principles and applications. MR 1938616
  • 7. Whitfield Diffie and Martin E. Hellman, New directions in cryptography, IEEE Trans. Information Theory IT-22 (1976), no. 6, 644–654. MR 0437208
  • 8. W. Diffie and M. Hellman, ``Exhaustive Cryptanalysis of the NBS Data Encryption Standard'', Computer, Vol. 10, No. 6, June 1977, pp. 74-84.
  • 9. J. Ellis, The Possibility of Secure Non-Secret Digital Encryption, GCHQ-CESG publication, January 1970.
  • 10. Oded Goldreich, Modern cryptography, probabilistic proofs and pseudorandomness, Algorithms and Combinatorics, vol. 17, Springer-Verlag, Berlin, 1999. MR 1665938
  • 11. Oded Goldreich, Foundations of cryptography, Cambridge University Press, Cambridge, 2001. Basic tools. MR 1881185
  • 12. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 2002.
  • 13. Neal Koblitz, Algebraic aspects of cryptography, Algorithms and Computation in Mathematics, vol. 3, Springer-Verlag, Berlin, 1998. With an appendix by Alfred J. Menezes, Yi-Hong Wu and Robert J. Zuccherato. MR 1610535
  • 14. Mitsuru Matsui, ``Linear Cryptanalysis Method for DES Cipher'', Eurocrypt '93, Springer-Verlag, 1994, pp. 386-397.
  • 15. Kevin S. McCurley, The discrete logarithm problem, Cryptology and computational number theory (Boulder, CO, 1989) Proc. Sympos. Appl. Math., vol. 42, Amer. Math. Soc., Providence, RI, 1990, pp. 49–74. MR 1095551, https://doi.org/10.1090/psapm/042/1095551
  • 16. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of applied cryptography, CRC Press Series on Discrete Mathematics and its Applications, CRC Press, Boca Raton, FL, 1997. With a foreword by Ronald L. Rivest. MR 1412797
  • 17. R. Merkle, ``Secure Communications over Insecure Channels'', Communications of the ACM, Vol. 21, No. 4 (1978), pp. 294-499.
  • 18. R. Mollin, RSA and Public-Key Cryptography, Chapman and Hall/CRC, 2003.
  • 19. National Security Agency, Committee on National Security Systems, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15, Fact Sheet 1, June 2003.
  • 20. Carl Pomerance, A tale of two sieves, Notices Amer. Math. Soc. 43 (1996), no. 12, 1473–1485. MR 1416721
  • 21. C. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, October 1949, pp. 656-716. MR 11:258d
  • 22. Douglas R. Stinson, Cryptography, 2nd ed., CRC Press Series on Discrete Mathematics and its Applications, Chapman & Hall/CRC, Boca Raton, FL, 2002. Theory and practice. MR 1911330
  • 23. United States Department of Commerce, National Bureau of Standards (1977), ``Data Encryption Standard'', Federal Information Processing Standard Publication No. 46.
  • 24. S. Vaudenay, ``Security Flaws Induced by CBC Padding -- Applications to SSL, IPSEC, WTLS, ...'', Eurocrypt 2002, Springer- Verlag, 2002, pp. 534-546.
  • 25. L. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman and Hall/CRC, 2003.

Review Information:

Reviewer: Susan Landau
Affiliation: Sun Microsystems
Email: susan.landau@sun.com
Journal: Bull. Amer. Math. Soc. 41 (2004), 357-367
Published electronically: February 24, 2004
Review copyright: © Copyright 2004 American Mathematical Society