Math:
- Abstract Algebra, Third Edition; I. N. Herstein; Prentice Hall, Inc.; 1996.
- A Course in Number Theory and Cryptography, Second Edition; Neal Koblitz; Springer-Verlag New York, Inc.; 1994.
- Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics, Volume 3; Neal Koblitz; Springer-Verlag Berlin Heidelberg; 1998.
- Application of Finite Fields; Alfred J. Menezes, Editor; Ian F. Blake; XuHong Gao; Ronald C. Mullin; Scott A. Vanstone; Tomik Yaghoobian; Kluwer Academic Publishers.
- An Introduction to Mathematical Cryptography; Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman; Springer Science+Business Media; LLC; 2008.
- Elementary Number Theory, Sixth Edition; David M. Burton; McGraw Hill; 2007.
- Finite Fields for Computer Scientists and Engineers; Robert J. McEliece; Kluwer Academic Publishers; 1987.
- Hardware Implementation of Finite-Field Arithmetic; Jean-Pierre Deschamps; Jose Luis Imana; Gustavo D. Sutter; The McGraw-Hill Companies, Inc.; 2009.
- Introduction to Cryptography; Johannes A. Buchmann; Springer-Verlag New York, Inc.; 2001.
- The Beauty of Doing Mathematics, Three Public Dialogues; Serge Lang; Springer-Verlag New York Inc.; 1985.
- The Language of Mathematics; Frank Land; John Murray (Publishers) Ltd.; 1960.
- The Mathematical Theory of Communication; Claude E. Shannon; Warren Weaver; The University of Illinois Press – Urbana; 1964.
- The Theory of Algebraic Numbers; Harry Pollard, Cornel University; The Mathematical Association of America; 1950.
- Topics in Algebra, Second Edition; I.N. Herstein; Xerox Corporation; 1975.
- What is Mathematics, Really?; Reuben Hersh; 1997.
Cryptography:
- Code; Simon Singh; 1999.
- Crypto; Steven Levy; Penguin Books Ltd.; 2001.
- Cryptographic Algorithms on Reconfigurable Hardware; Francisco Rodriguez-Henriquez; N. A. Saqib; A. Diaz-Perez; Cetin Kaya Koc; Springer Science+Business Media, LLC; 2006.
- Cryptography in C and C++, Second Edition; Michael Welschenbach; Apress; 2005.
- Cryptography and Network Security – Principle and Practice, Third Edition; William Stallings; Pearson Education, Inc.; 2003.
- Cryptography – Theory and Practice; Douglas R. Stinson; CRC Press LLC; 1995.
- Handbook of Applied Cryptography; Alfred J. Menezes; Paul C. van Oorschot; Scott A. Vanstone; CRC Press LLC; 1997
- In Code – A Mathematical Journey, Sarah Flannery with David Flannery; Profile Books Ltd.; 2000.
- Introduction to Cryptography with Coding Theory, Second Edition; Wade Trappe; Lawrence Washington; Pearson Education, Inc.; 2006.
- The Code-breakers; David Kahn; 1996.
- Understanding Cryptography – A Textbook for Students and Practitioners; Christof Paar; Jan Pelzl; Springer-Verlag Berlin Heidelberg; 2010.
Elliptic Curve Cryptography:
- Elliptic Curve Cryptography for Constrained Devices – Algorithms, Architectures, and Practical Implementations; Sandeep S. Kumar; VDM Verlag Dr. Muller Aktiengesellschaft & Co. KG and licencors; 2008.
- Elliptic Curve Public Key Cryptosystems; Alfred Menezes, Auburn University; Kluwer Academic Publishers, Fourth Printing; 1997.
- Guide to Elliptic Curve Cryptography; Darrel Hankerson; Alfred Menezes; Scott Vanstone; Springer-Verlag New York Inc.; 2004
- Implementing Elliptic Curve Cryptography; Michael Rosing; Manning Publications Co.; 1999.
Hardware:
- High-Level Synthesis, Introduction to Chip and System Design; Daniel Gajski; Nikil Dutt; Allen Wu; Steve Lin; Kluwer Academic Publishers, Fourth Printing; 1997.
- The Verilog Hardware Description Language; Donald E. Thomas; Philip Moorby; Kluwer Academic Publishers, Second Printing; 1991.
- VHDL Made Easy!; David Pellerin; Douglas Taylor; Prentice Hall; 1997.
Security:
- “Security Metrics”; Andrew Jaquith; Pearson Education, Inc; 2007
- “Security Engineering”; Ross Anderson; Wiley Publishing, Inc.; 2008
- “Beautiful Security”; Andy Oram, John Viega; O’Reilly Media, Inc.; 2009
- “The Basic of Information Security”; Jason Andress; Elsevier Inc.; 2011
Cryptanalysis:
- “Applied Cryptanalysis”; Mark Stamp, Richard M. Low; John Wiley & Sons, Inc; 2007
Reply