Department of Electrical and Computer Engineering George Mason University Volgenau School of Engineering


Related Mathematical Resources


Chapters 4 and 8 of
William Stallings, Cryptography and Network Security: Principles and Practice Prentice Hall; 6th edition, 2013, ISBN: 978-0-13-335469-0

Chapters 2 and 4 of
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, Inc., 1996 (can be downloaded from the book web page).

Side-Channel Analysis

  • Power Analysis Attacks Revealing the Secrets of Smart Cards by Stefan MangardElisabeth OswaldThomas Popp, Springer, 2007, ISBN: 978-0-387-30857-9.
  • Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits by Eric Peeters Springer 2013, ISBN: 978-1-4614-6782-3.
  • The Hardware Hacking Handbook Breaking Embedded Security with Hardware Attacks by Colin O'Flynn and Jasper van Woudenberg, No Starch Press, 2021, ISBN: 978-1-5932-7874-8.

Other Books about Cryptography

A comprehensive list of book on cryptography and the history of cryptography can be found on Wikipedia.

Proceedings of the Following Conferences

(selected articles will be used during the course)

  • RSA Data Security Conf. - since 1992
  • CHES - since 1999
  • CRYPTO - since 1982
  • EUROCRYPT - since 1984
  • ASIACRYPT - since 1991