Criptología moderna en inglés.

 

Cipher systems. The protection of communications

Henry Beker y Fred Piper. Northwood books 1982.

Cryptology

Albrecht Beutelsphacher. Mathematical Association of America, 1994.

Initial observations on Skipjack: cryptanalysis of Skipjack-3XOR

Eli Biham y Adi Shamir 1998.

Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials

Eli Biham y Adi Shamir 1998.

Introduction to cryptography. Second Edition.

Johannes A. Buchmann. Springer 2004.

The automated cryptanalysis of substitution ciphers

John M. Carroll, Steve Martin. Cryptologia vol. X nº 4, Octubre 1996.

The automated cryptanalysis of polyalphabetic ciphers

John M. Carroll, Lynda Robbins. Cryptologia Vol. XI nº 4. Octubre de 1987.

Optimisation heuristics for cryptology

Andrew John Clark. Thesis for degree of Doctor of Philosophy. Febrero 1998.

Applied cryptology, cryptographic protocols, and computer security models

Richard de Millo. American Mathematical society 1983.

Cracking DES

Electronic Frontier Foundation. O´Reilly & Associates 1998.

Cryptanalysis of Akelarre

N. Ferguson, B. Schneier.

Federal Information Processing Standards Publication 81. DES modes of operation.

NIST. 2 de Diciembre de 1980.

Automated cryptanalysis of substitution ciphers

W. S. Forsyth, R. Safavi-Naini. Cryptologia Octubre 1993.

Handbook of applied cryptography

Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. CRC Press 1997.

Icsa Guide to Cryptography

Randall K. Nichols. McGraw-Hill Professional 1998.

Mathematical cryptology for computer scientists and mathematicians

Wayne Patterson. Rowman & Littlefield 1987.

A method for obtaining digital signatures and public key cryptosystems

R. Rivest, L. Shamir, A. Adleman. Communications ACM 21-2. 1978.

Analysis and design of stream ciphers

Rainer A. Rueppel. Springer-Verlag 1986.

Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd Edition

Bruce Schneier. John Wiley & Sons 1995.

Cryptography and Network Security: Principles and Practice", 3rd ed.

William Stallings. Prentice Hall, Inc; 2002.

Cryptography - Theory and Practice, 2nd Edition

Douglas R. Stinson. CRC Press, Inc. 2002.

Cryptography. An introduction to computer security

Jennifer Seberry y Josef Pieprzyk. Prentice Hall 1989.

Applied Cryptanalysis: Breaking Ciphers in the Real World

Mark Stamp, Richard M. Low.  Wiley-IEEE Press 2007.

Cryptology Unlocked

Reinhard Wobst. John Wiley & Sons 2007.