1. Abstract Algebra, Third Edition; I. N. Herstein; Prentice Hall, Inc.; 1996.
  2. A Course in Number Theory and Cryptography, Second Edition; Neal Koblitz; Springer-Verlag New York, Inc.; 1994.
  3. Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics, Volume 3; Neal Koblitz; Springer-Verlag Berlin Heidelberg; 1998.
  4. Application of Finite Fields; Alfred J. Menezes, Editor; Ian F. Blake; XuHong Gao; Ronald C. Mullin; Scott A. Vanstone; Tomik Yaghoobian; Kluwer Academic Publishers.
  5. An Introduction to Mathematical Cryptography; Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman; Springer Science+Business Media; LLC; 2008.
  6. Elementary Number Theory, Sixth Edition; David M. Burton; McGraw Hill; 2007.
  7. Finite Fields for Computer Scientists and Engineers; Robert J. McEliece; Kluwer Academic Publishers; 1987.
  8. Hardware Implementation of Finite-Field Arithmetic; Jean-Pierre Deschamps; Jose Luis Imana; Gustavo D. Sutter; The McGraw-Hill Companies, Inc.; 2009.
  9. Introduction to Cryptography; Johannes A. Buchmann; Springer-Verlag New York, Inc.; 2001.
  10. The Beauty of Doing Mathematics, Three Public Dialogues; Serge Lang; Springer-Verlag New York Inc.; 1985.
  11. The Language of Mathematics; Frank Land; John Murray (Publishers) Ltd.; 1960.
  12. The Mathematical Theory of Communication; Claude E. Shannon; Warren Weaver; The University of Illinois Press – Urbana; 1964.
  13. The Theory of Algebraic Numbers; Harry Pollard, Cornel University; The Mathematical Association of America; 1950.
  14. Topics in Algebra, Second Edition; I.N. Herstein; Xerox Corporation; 1975.
  15. What is Mathematics, Really?; Reuben Hersh; 1997.


  1. Code; Simon Singh; 1999.
  2. Crypto; Steven Levy; Penguin Books Ltd.; 2001.
  3. Cryptographic Algorithms on Reconfigurable Hardware; Francisco Rodriguez-Henriquez; N. A. Saqib; A. Diaz-Perez; Cetin Kaya Koc; Springer Science+Business Media, LLC; 2006.
  4. Cryptography in C and C++, Second Edition; Michael Welschenbach; Apress; 2005.
  5. Cryptography and Network Security – Principle and Practice, Third Edition; William Stallings; Pearson Education, Inc.; 2003.
  6. Cryptography – Theory and Practice; Douglas R. Stinson; CRC Press LLC; 1995.
  7. Handbook of Applied Cryptography; Alfred J. Menezes; Paul C. van Oorschot; Scott A. Vanstone; CRC Press LLC; 1997
  8. In Code – A Mathematical Journey, Sarah Flannery with David Flannery; Profile Books Ltd.; 2000.
  9. Introduction to Cryptography with Coding Theory, Second Edition; Wade Trappe; Lawrence Washington; Pearson Education, Inc.; 2006.
  10. The Code-breakers; David Kahn; 1996.
  11. Understanding Cryptography – A Textbook for Students and Practitioners; Christof Paar; Jan Pelzl; Springer-Verlag Berlin Heidelberg; 2010.

Elliptic Curve Cryptography:

  1. Elliptic Curve Cryptography for Constrained Devices – Algorithms, Architectures, and Practical Implementations; Sandeep S. Kumar; VDM Verlag Dr. Muller Aktiengesellschaft & Co. KG and licencors; 2008.
  2. Elliptic Curve Public Key Cryptosystems; Alfred Menezes, Auburn University; Kluwer Academic Publishers, Fourth Printing; 1997.
  3. Guide to Elliptic Curve Cryptography; Darrel Hankerson; Alfred Menezes; Scott Vanstone; Springer-Verlag New York Inc.; 2004
  4. Implementing Elliptic Curve Cryptography; Michael Rosing; Manning Publications Co.; 1999.


  1. High-Level Synthesis, Introduction to Chip and System Design; Daniel Gajski; Nikil Dutt; Allen Wu; Steve Lin; Kluwer Academic Publishers, Fourth Printing; 1997.
  2. The Verilog Hardware Description Language; Donald E. Thomas; Philip Moorby; Kluwer Academic Publishers, Second Printing; 1991.
  3. VHDL Made Easy!; David Pellerin; Douglas Taylor; Prentice Hall; 1997.
  1. “Security Metrics”; Andrew Jaquith; Pearson Education, Inc; 2007
  2. “Security Engineering”; Ross Anderson; Wiley Publishing, Inc.; 2008
  3. “Beautiful Security”; Andy Oram, John Viega; O’Reilly Media, Inc.; 2009
  4. “The Basic of Information Security”; Jason Andress; Elsevier Inc.; 2011
  1. “Applied Cryptanalysis”; Mark Stamp, Richard M. Low; John Wiley & Sons, Inc; 2007