Department of Electrical and Computer Engineering George Mason University Volgenau School of IT & Engineering


Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall; 5th edition, 2011, ISBN: 978-0-13-609704-4

Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press, Inc.; 1996, ISBN: 0-84-938523-7. (all chapters of this book can be downloaded from the book web page)

Related Mathematical Resources


Chapters 4 and 8 of
William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall; 5th edition, 2011.

Chapters 2 and 4 of
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, Inc., 1996 (can be downloaded from the book web page).


Song Y. Yan, Number Theory for Computing, 2nd ed., Springer-Verlag, Berlin, 2002.

David M. Burton, Elementary Number Theory, International Series in Pure and Applied Mathematics, 3rd. ed., The McGraw-Hill Companies, Inc., 1997.

Historical Books

David Kahn, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, 2nd ed., Scribner, New York, 1996.

Simon Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography, Anchor, 2000.

Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology, 2nd ed. Springer, Berlin, 2000.

Steven Levy, Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age, Penguin Putnam, 2002.

Additional Reading

Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, PTR Prentice Hall, Englewood Cliffs, 2002.

M. Welschenbach, Cryptography in C and C++, Apress, 2001.

Douglas R. Stinson, Cryptography - Theory and Practice, 3rd ed., CRC Press, Inc., 2005.

Bruce Schneier, Applied Cryptography - Protocols, Algorithms, and Source Code in C, 2nd ed., John Wiley & Sons, Inc., New York, 1995.

Electronic Newsletters


On-line Collections of Papers

Springer-Verlag Lecture Notes in Computer Science

IACR Cryptology ePrint Archive

Journals and Periodicals

Journal of Cryptology - since 1989

CryptoBytes - since 1995

Journal of Computer Security - since 1994

Proceedings of the Following Conferences

(selected articles will be used during the course)

  • RSA Data Security Conf. - since 1992
  • CHES - since 1999
  • CRYPTO - since 1982
  • EUROCRYPT - since 1984
  • ASIACRYPT - since 1991