Criptología moderna en inglés.
Cipher systems. The protection of communications |
Henry Beker y Fred Piper. Northwood books 1982. |
Cryptology |
Albrecht Beutelsphacher. Mathematical Association of America, 1994. |
Initial observations on Skipjack: cryptanalysis of Skipjack-3XOR |
Eli Biham y Adi Shamir 1998. |
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials |
Eli Biham y Adi Shamir 1998. |
Introduction to cryptography. Second Edition. |
Johannes A. Buchmann. Springer 2004. |
The automated cryptanalysis of substitution ciphers |
John M. Carroll, Steve Martin. Cryptologia vol. X nº 4, Octubre 1996. |
The automated cryptanalysis of polyalphabetic ciphers |
John M. Carroll, Lynda Robbins. Cryptologia Vol. XI nº 4. Octubre de 1987. |
Optimisation heuristics for cryptology |
Andrew John Clark. Thesis for degree of Doctor of Philosophy. Febrero 1998. |
Applied cryptology, cryptographic protocols, and computer security models |
Richard de Millo. American Mathematical society 1983. |
Cracking DES |
Electronic Frontier Foundation. O´Reilly & Associates 1998. |
Cryptanalysis of Akelarre |
N. Ferguson, B. Schneier. |
Federal Information Processing Standards Publication 81. DES modes of operation. |
NIST. 2 de Diciembre de 1980. |
Automated cryptanalysis of substitution ciphers |
W. S. Forsyth, R. Safavi-Naini. Cryptologia Octubre 1993. |
Handbook of applied cryptography |
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. CRC Press 1997. |
Icsa Guide to Cryptography |
Randall K. Nichols. McGraw-Hill Professional 1998. |
Mathematical cryptology for computer scientists and mathematicians |
Wayne Patterson. Rowman & Littlefield 1987. |
A method for obtaining digital signatures and public key cryptosystems |
R. Rivest, L. Shamir, A. Adleman. Communications ACM 21-2. 1978. |
Analysis and design of stream ciphers |
Rainer A. Rueppel. Springer-Verlag 1986. |
Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd Edition |
Bruce Schneier. John Wiley & Sons 1995. |
Cryptography and Network Security: Principles and Practice", 3rd ed. |
William Stallings. Prentice Hall, Inc; 2002. |
Cryptography - Theory and Practice, 2nd Edition |
Douglas R. Stinson. CRC Press, Inc. 2002. |
Cryptography. An introduction to computer security |
Jennifer Seberry y Josef Pieprzyk. Prentice Hall 1989. |
Applied Cryptanalysis: Breaking Ciphers in the Real World |
Mark Stamp, Richard M. Low. Wiley-IEEE Press 2007. |
Cryptology Unlocked |
Reinhard Wobst. John Wiley & Sons 2007. |