Remote Access Bulletin of the American Mathematical Society

Bulletin of the American Mathematical Society

ISSN 1088-9485(online) ISSN 0273-0979(print)

Book Review

The AMS does not provide abstracts of book reviews. You may download the entire review from the links below.


Full text of review: PDF   This review is available free of charge.
Book Information:

Author: Richard Mollin
Title: RSA and Public-Key Cryptography
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2003, xii + 291 pp., ISBN 1-58488-338-3, $79.95

Authors: Hans Delfs and Helmut Knebl
Title: Introduction to Cryptography
Additional book information: Springer-Verlag, Berlin, 2002, xiv + 310 pp., ISBN 3-540-42278-1, $49.95

Author: Douglas Stinson
Title: Cryptography: Theory and Practice
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2002, xxi + 339 pp., ISBN 1-58488-206-9, $79.95

Author: Neal Koblitz
Title: Algebraic Aspects of Cryptography
Additional book information: Springer-Verlag, Berlin, 1998, ix + 206 pp., ISBN 3-540-63446-0, $79.95

Author: Lawrence Washington
Title: Elliptic Curves: Number Theory and Cryptography
Additional book information: Chapman and Hall/CRC, Boca Raton, FL, 2003, xi + 428 pp., ISBN 1-58488-365-0, $79.95

Authors: Ian Blake, Gadiel Seroussi and Nigel Smart
Title: Elliptic Curves in Cryptography
Additional book information: Cambridge University Press, Cambridge, 1999, xv + 204 pp., ISBN 0-521-65374-6, $42.00

Author: Oded Goldreich
Title: Modern Cryptography, Probabilistic Proofs and Pseudorandomness
Additional book information: Springer-Verlag, Berlin, 1999, xv + 182 pp., ISBN 3-540-64766-X, $97.00

Author: Oded Goldreich
Title: Foundations of Cryptography: Basic Tools
Additional book information: Cambridge University Press, Cambridge, 2001, xix + 372 pp., ISBN 0-521-79172-3, $75.00

Authors: Joan Daemen and Vincent Rijmen
Title: The Design of Rijndael: AES --- the Advanced Encryption Standard
Additional book information: Springer-Verlag, Berlin, 2002, ix + 238 pp., ISBN 3-540-42580-2, $44.95

Authors: Alfred Menezes, Paul van Oorschot and Scott Vanstone
Title: Handbook of Applied Cryptography
Additional book information: CRC Press, Boca Raton, FL, 1997, xxviii + 780 pp., ISBN 0-8493-8523-7, $99.95

References [Enhancements On Off] (What's this?)

  • 1. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993. MR 95a:94007
  • 2. J. Black and H. Urtubia, ``Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption'', 11th USENIX Security Symposium, 2002, http://www.cs.colorado.edu/jrblack/papers.html
  • 3. I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, Cambridge University Press, 1999. MR 2001i:94048
  • 4. D. Bleichenbacher, B. Kaliski, J. Staddon, ``Recent Results on PCKS# 1: RSA Encryption Standard'', RSA Laboratories' Bulletin, Number 7, June 26, 1998.
  • 5. J. Daemen and V. Rijmen, The Design of Rijndael: AES -- the Advanced Encryption Standard, Springer-Verlag, 2002.
  • 6. H. Delfs and H. Knebl, Introduction to Cryptography, Springer-Verlag, 2002. MR 2003m:94060
  • 7. W. Diffie and M. Hellman, ``New Directions in Cryptography'', IEEE Transactions in Information Theory, Vol. IT-22, No. 6 (1976). MR 55:10141
  • 8. W. Diffie and M. Hellman, ``Exhaustive Cryptanalysis of the NBS Data Encryption Standard'', Computer, Vol. 10, No. 6, June 1977, pp. 74-84.
  • 9. J. Ellis, The Possibility of Secure Non-Secret Digital Encryption, GCHQ-CESG publication, January 1970.
  • 10. O. Goldreich, Modern Cryptography, Probabilistic Proofs, and Pseudorandomness, Springer-Verlag, 1999. MR 2000f:94029
  • 11. O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge Univ. Press, 2001. MR 2004a:94042
  • 12. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 2002.
  • 13. N. Koblitz, Algebraic Aspects of Cryptography, Springer-Verlag, 1998. MR 2000a:94012
  • 14. Mitsuru Matsui, ``Linear Cryptanalysis Method for DES Cipher'', Eurocrypt '93, Springer-Verlag, 1994, pp. 386-397.
  • 15. K. McCurley, ``The Discrete Logarithm Problem'', in C. Pomerance, ed., Cryptology and Computational Number Theory, American Mathematical Society, Proceedings of Symposia in Applied Mathematics, Vol. 42, 1990, pp. 49-74. MR 92d:11133
  • 16. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997 (fifth printing, 2001). MR 99g:94015
  • 17. R. Merkle, ``Secure Communications over Insecure Channels'', Communications of the ACM, Vol. 21, No. 4 (1978), pp. 294-499.
  • 18. R. Mollin, RSA and Public-Key Cryptography, Chapman and Hall/CRC, 2003.
  • 19. National Security Agency, Committee on National Security Systems, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15, Fact Sheet 1, June 2003.
  • 20. C. Pomerance, ``A Tale of Two Sieves'', Notices of the American Mathematical Society, Vol. 43 (1996), pp. 1473-85. MR 97f:11100
  • 21. C. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, October 1949, pp. 656-716. MR 11:258d
  • 22. D. Stinson, Cryptography: Theory and Practice, Chapman and Hall/CRC, 2002. MR 2003c:94035
  • 23. United States Department of Commerce, National Bureau of Standards (1977), ``Data Encryption Standard'', Federal Information Processing Standard Publication No. 46.
  • 24. S. Vaudenay, ``Security Flaws Induced by CBC Padding -- Applications to SSL, IPSEC, WTLS, ...'', Eurocrypt 2002, Springer- Verlag, 2002, pp. 534-546.
  • 25. L. Washington, Elliptic Curves: Number Theory and Cryptography, Chapman and Hall/CRC, 2003.

Review Information:

Reviewer: Susan Landau
Affiliation: Sun Microsystems
Email: susan.landau@sun.com
Journal: Bull. Amer. Math. Soc. 41 (2004), 357-367
MSC (2000): Primary 94A60
Published electronically: February 24, 2004
Review copyright: © Copyright 2004 American Mathematical Society
American Mathematical Society