The following reviews shall help the IACR members and also the wider community to buy books in the area of cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review,
please contact **Edoardo Persichetti** (University of Warsaw, Poland) via ** books at iacr.org**.
In the latter case, first check the
list of reviewable books if your favourite book is still
available.
At the moment, this list contains books of Cambridge University Press,
CRC Press/Taylor & Francis, Presses Polytechnique Et Universitaires Romandes and Springer, whose support we hereby gratefully acknowledge.

New reviews are added continuously at the top of this page. If you search for a specific topic, use <CTRL>+F (or likewise) in your browser.

**Jeffrey Hoffstein, Jill Pipher and Joseph Silverman: "An Introduction to Mathematical Cryptography", 2008:**

*This volume provides an excellent introduction to the mathematics of cryptography. Its simple style make it accessible even to readers without a consistent mathematical background. I highly recommend this book to anyone, in particular non-specialists that are interested in the topic, and students that want to approach cryptography from a mathematical point of view. It is also very useful for instructors in the same context - I personally found it an an invaluable tool for preparing my graduate cryptography course.*

**Publisher:**Springer.**ISBN: 978-0-387-77993-5**

Review written by Edoardo Persichetti (University of Warsaw, Poland). (Date: 2014-03-27)**Alasdair McAndrew: "Introduction to Cryptography with Open-Source Software", 2011:**

*This very well written book is recommended to graduate or final year undergraduate students intended to start research work on both theoretical and experimental cryptography. Most of the cryptographic protocols are illustrated by various examples and implemented using the open-source algebra software Sage. The book provides a rigorous introduction to the mathematics used in cryptographic and covers almost all modern practical cryptosystems. Also, the book is certainly a valuable resource for practitioners looking for experimental cryptography with a computer algebra system.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-2570-9**

Review written by Abderrahmane Nitaj (LMNO, Université de Caen Basse Normandie, France). (Date: 2014-02-13)**Bruno Martin: "Codage, Cryptologie et Applications [French]", 2006:**

*This French book succinctly describes the mathematical principles of cryptography and error correcting codes. Once these principles are introduced, the book presents their use in some telecommunication applications (at the state of the art in 2004). The book does not define its target audience. It is probably not enough detailed for a skilled audience, nor particularly suitable for beginners and students, since it requires mathematical background that they would have to find elsewhere.*

**Publisher:**Presses Polytechnique Et Universitaires Romandes.**ISBN: 2-88074-569-1**

Review written by Eric Diehl (Technicolor, Paris, France). (Date: 2014-02-12)**Thomas Baignères, Pascal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay: "A Classical Introduction To Cryptography Exercise Book", 2006:**

*The book's main goal is to show how some mathematical notions of calculus, algebra, and computer science are used to study the security of various cryptosystems. The volume is a collection of exercises, including hints and solutions, and is suitable for advanced undergraduate and graduate students as well as students in computer science and engineering and practitioners who want to understand the mathematical techniques behind cryptography.*

**Publisher:**Springer.**ISBN: 978-0-387-27934-3**

Review written by Abdelhak Azhari (Hassan II University, Casablanca, Morocco). (Date: 2014-02-12)**Rudolf Lidl and Harald Niederreiter: "Finite Fields (Second Edition)", 2008:**

*This volume gives a comprehensive coverage of the theory of finite fields and its most important applications such as combinatorics and coding theory. Its simple and reader-friendly style, and the inclusion of many worked examples and exercises make it suitable not only as a reference volume for the topic, but also as a textbook for a dedicated course. I highly recommend the book to any person interested in the theory of finite fields and its applications.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-06567-2**

Review written by Edoardo Persichetti (Warsaw University, Warsaw, Poland). (Date: 2014-01-30)**Francesco Bonchi and Elena Ferrari (Editors): "Privacy-Aware Knowledge Discovery", 2011:**

*This book presents the latest researches in privacy aware knowledge discovery for different application domains such as transportation, medical records and social networks. It is neither an introduction to privacy for data mining, nor a textbook on the subject. The book demonstrates that anonymizing data is context dependent, extremely difficult, and still a domain in its infancy. If the reader is looking for a glimpse to this diversity, then this is a good book.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-0365-3**

Review written by Eric Diehl (Technicolor, Paris, France). (Date: 2013-09-23)**Pim Tuyls, Boris Skoric and Tom Kevenaar (Editors): "Security with Noisy Data", 2007:**

*This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. Considering that the book is composed with independent chapters each at the research level I would recommend this book for senior researchers, but he audience level must be at least PhD students.*

**Publisher:**Springer.**ISBN: 978-1-84628-983-5**

Review written by Nadia El Mrabet (Université Paris 8, France). (Date: 2013-09-23)**Gregory V. Bard: "Algebraic Cryptanalysis", 2009:**

*This book is highly recommended for graduate or final year undergraduate students intended to start research work on algebraic cryptanalysis. It is an excellent starting point and covers most of the important topics required to study and apply algebraic attack on modern ciphers.*

**Publisher:**Springer.**ISBN: 978-0-387-88756-2**

Review written by Rusydi Hasan Makarim (Institute of Applied Mathematics, Middle East Technical University, Ankara, Turkey). (Date: 2013-09-23)

A previous review of this book by Wael Said Abdel mageed Mohamed can be found here. (Date: 2010-01-13)**Ian Blake, Gadiel Seroussi, Nigel Smart: "Elliptic Curves in Cryptography", 1999:**

*This is a dense and small book. Only within about two hundred pages it covers almost everything about elliptic curve cryptography. Due to that reason, at times it almost feels like a survey paper, rather than a book. In most of the chapters, the authors nicely captured the high level ideas and mentioned various pitfalls important for implementation. However, in many cases they skipped the detailed mathematical proofs and referred the readers to original papers. This is not a self-sustaining book that one can read from start to end, but it could be useful as a starting reference for elliptic curve cryptography.*

**Publisher:**Cambridge University Press.**ISBN: 0-521-65374-6**

Review written by Avradip Mandal (Microsoft Corporation, USA). (Date: 2013-09-16)**Jacques Calmet, Willi Geiselmann, Joern Mueller-Quade: "Mathematical Methods in Computer Science", 2008:**

*This book is mostly a short proceedings of a conference. I find that while most of the papers are really interesting, it is hard to reflect properly on the chosen selection. The choice of papers covers a wide range of the field, so on the one hand, specialists (scientific, experts) can find useful information, on the other hand, the book is really accessible to students.*

**Publisher:**Springer.**ISBN: 978-0-540-89993-8**

Review written by Olivier Blazy (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2013-09-16)**Imre Csiszar and Janos Koerner: "Information Theory: Coding Theorems for Discrete Memoryless Systems", 2011:**

*The book is written very rigorously in theorem/proof fashion with motivation mostly relegated to the historical discussions at the end of each chapter. It will be a useful reference for the researcher, as well as a very good textbook for a rigorous graduate level course in the area. I recommend the book heartily to specialists and beginning researchers in the area who want to make their mark by learning the strongest techniques available.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-19681-9**

Review written by Serdar Boztas (Royal Melbourne Institute of Technology, Melbourne, Australia). (Date: 2013-08-21)**Michael A. Nielsen, Isaac L. Chang: "Quantum Computation and Quantum Information", 2010:**

*Though quite a comprehensive guide to quantum information and computation, this book is written in an accessible style, with numerous explanations and exercises. One of the book's best qualities is the remarkably logical and systematic style in which the authors present quantum information and computation systems. I would heartily recommend this book to anyone who is interested in quantum information and quantum computation.*

**Publisher:**Cambridge University Press.**ISBN: 978-1-107-00217-3**

Review written by Cristina Onete (IRISA/INRIA, Rennes, France). (Date: 2013-08-21)**Ljupco Kocarev and Shiguo Lian: "Chaos-Based Cryptography", 2011:**

*This book on chaos-based cryptography has eleven chapters contributed by experts working on chaotic systems and their applications to cryptography. It is the first such book on chaos-based cryptography and a good introduction to theory, algorithms, and applications. I strongly recommend this book as a valuable reference on applications of chaos theory to cryptography.*

**Publisher:**Springer.**ISBN: 978-3-642-20541-5**

Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2013-08-21)**Emmanuel Desurvire: "Classical and Quantum Information Theory", 2009:**

*This is an introductory book that tries to appeal to as broad an audience base as possible. The trade-off is that the treatment covers only the very basic materials in each topic. The most delightful feature of the book is how the illustrations and examples provided really fit into the author's discussions of the topics.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-88171-5**

Review written by M. Frederic Ezerman (Centre for Quantum Technologies, National University of Singapore). (Date: 2013-08-21)**Sara Foresti: "Preserving Privacy in Data Outsourcing", 2011:**

*This book presents the author's collective research publications on methods to securely outsource data. It is clearly written and focuses on proposing a model for access control enforcement, a system for privacy protection and a solution for integrating data from different sources safely.*

**Publisher:**Springer.**ISBN: 978-0-387-87968-0**

Review written by Jothi Rangasami (Queensland University of Technology, Brisbane, Australia). (Date: 2013-08-21)**Oded Goldreich: "Foundations of Cryptography", Volumes I and II, 2001 and 2004:**

*Foundations of Cryptography by Oded Goldreich is a technical book that provides a rigorous and systematic treatment of the subject. The two volumes that compose the book give an extensive description of both basic cryptographic tools and their applications. I recommend the book as a reference for expert readers, or as a text book for a graduate cryptography course that has a computer science perspective.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-79172-3 and 978-0-521-83084-2**

Review written by Edoardo Persichetti (Warsaw University, Warsaw, Poland). (Date: 2013-07-03)**Robert C. Newman: "Computer Forensics - Evidence Collection and Management", 2007:**

*This book gives an overview of the topics and necessities in computer forensics, but it does not cover technical details. While it gives broad information on computer forensics, the content of each chapter is often too shallow to be of specific use. The what-to-do can be learned from this book, but the how-to-do-it is not covered. Thus, it might be useful for those in charge of a department of computer forensics or a technician, who wants to learn something about the widespread surroundings of computer forensics.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0-8493-0561-0**

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2013-06-14)**J. H. Loxton: "Number Theory and Cryptography", 1990:**

*A book that left me bitter and sweet tastes. The lack of homogeneity in every aspect just mixed me. Several articles are of very high quality and impact, however they are lost in the mixture and the problem is not that the mixture is 23 years old. Even if several articles can be read easily by undergraduates, they may find excellent textbooks in cryptography. The target audience of this book is only academia, especially researchers who are looking for specific results that had been presented in the workshop or the meeting.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-39877-0**

Review written by Constantinos Patsakis (Trinity Colege Dublin, Ireland). (Date: 2013-06-14)**Colin Boyd and Anish Mathuria: "Protocols for Authentication and Key Establishment", 2003:**

*This book gives an overview about 172 well-chosen cryptographic protocols. This includes descriptions of all their related classic attack types (and 36 protocol-specific attack types), too. As a comprehensive reference it is suitable for (under-)graduates, post-graduates and even professionals.*

**Publisher:**Springer.**ISBN: 978-354-043-1077**

Review written by Kilian David (IT Auditor, Germany). (Date: 2013-06-14)**Carmit Hazay, Yehuda Lindell: "Efficient Secure Two-Party Protocols", 2010:**

*This book provides a rigorous introduction to a smaller example of general secure multiparty computation (SMC), namely the case of two-party protocols. It is rather technical without being too dense, and with a constructive its structure, in the sense that it strives to construct a basic knowledge of provable security in two-party protocols. I would heartily recommend this book to anyone who is interested in provable security and secure multiparty computation, especially students just starting on the topic of cryptography. However, I would not recommend this book for the reader purely interested in recent protocols and applications of two-party protocols.*

**Publisher:**Springer.**ISBN: 978-3-642-14303-8**

Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2013-06-14)**James Graham, Richard Howard and Ryan Olson: "Cyber Security Essentials", 2011:**

*Reading the title of the book, one might expect that it would focus on past, today and future of cyber security and cyber wars as well as its social aspects. But this book is a typical security book explaining mainly some network security issues with technical details. I would recommend this book only to network security experts who need to understand the technical details of certain topics like malicious code and network exploitation techniques. Otherwise, this book is suitable neither for application security experts nor for students.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-5123-4**

Review written by Emin Islam Tatli (Daimler TSS, Germany). (Date: 2013-06-14)**McEliece: "The Theory of Information and Coding (Second Edition)", 2002:**

*The Theory of Information and Coding by R. J. McEliece is a foundational book for Design Theory, serving as a reference for an independent reader or as a complement textbook for a related course. The second edition is enriched with additional content and exercises, providing a vast introduction to the study of the area. I strongly recommend the book to any reader interested in acquiring the basics of information theory and coding theory.*

**Publisher:**Cambridge University Press..**ISBN: 978-0-521-00095-6**

Review written by Edoardo Persichetti (Warsaw University, Warsaw, Poland). (Date: 2013-06-14)**Mike Hendry: "Multi-application Smart Cards Technology and Applications", 2007:**

*Written in condensed form to cover various aspects of smart cards and their use in various business sectors, the book is for readers with some background in communication technologies. It is a great resource to learn about the technology behind smart cards, how they work in practice, and the concerns in their implementation and management.*

**Publisher:**Cambridge University Press..**ISBN: 978-0-521-87384-0**

Review written by Yesem Kurt Peker (Columbus State University, Columbus, Georgia, USA). (Date: 2013-06-13)**Douglas J. Landoll: "The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments", 2011:**

*Written by an expert in the area, the book is an invaluable resource for those who want to step into the profession of security risk assessment. It covers almost all practical matters in security risk assessment in great detail from the manners in interacting with the customer to technical aspects along with useful charts, tables and sample reports.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-2148-0**

Review written by Yesem Kurt Peker (Columbus State University, Columbus, Georgia, USA). (Date: 2013-06-13)**Ahmad-Reza Sadeghi and David Naccache (Eds.): "Towards Hardware-Intrinsic Security: Foundations and Practice", 2010:**

*This book offers a useful introduction to research issues related to hardware-intrinsic security which is a new and growing field. Students, researchers and practitioners will find this book interesting and utilitarian. I recommend this book for those interested in various aspects of hardware security and in particular hardware-intrinsic security.*

**Publisher:**Springer.**ISBN: 978-3-642-14451-6**

Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2012-08-31)**Loren C. Larson: "Problem-Solving Through Problems", 1983:**

*Solving interesting math problems brings a kind of euphoria and satisfaction to our soul. This book contains many such problems, mainly taken from math olympiads, Putnam exams and math journals. Many important topics are covered and they are done in detail. More than 700 interesting examples with solutions to about 33% of them). This book is contagious. Have fun!*

**Publisher:**Springer.**ISBN: 978-0-387-96171-2**

Review written by Kian Tay (Center for Strategic Infocomm Technologies, Singapore). (Date: 2012-06-01)**William J. Buchanan: "Introduction to Security and Network Forensics", 2011:**

*This book offers an excellent practical introduction to important issues concerning network security and forensics. It will be a boon for novices, students and researchers. I strongly recommend this book as a useful introductory text on network security.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0-8493-3568-6**

Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2012-04-16)**Susan Loepp and William Wootters: "Protecting Information: From Classical Error Correction to Quantum Cryptography", 2006:**

*This book provides an elementary introduction to the basics of error correction and quantum cryptography. Suitable for upper-level undergraduates in mathematics, physics and computer science, this book is unusual amongst undergraduate texts on coding or cryptography in that it includes quantum physics and the emerging technology of quantum information. It is self-contained, providing students with a diverse exposure to the theory and applications of groups, finite fields as well as quantum physics. Numerous exercises are sprinkled throughout the text to aid the diligent student in better understanding concepts introduced in the text.*

**Publisher:**Cambridge University Press..**ISBN: 978-0-52153-476-3**

Review written by Fan Junjie, Bertrand (National University of Singapore). (Date: 2012-04-16)**Juraj Hromkovic: "Algorithmic Adventures", 2009:**

*In Algorithmic Adventures Juraj Hromkovic provides a very readable account of some of the most beautiful results in theoretical computer science. I recommend this book without reservation to anyone with an interest in theoretical computer science. Neophytes will find in it an outstanding introduction to the subject. Experts will appreciate its distillation of the fundamental ideas of computer science to their most essential forms.*

**Publisher:**Springer.**ISBN: 978-3-540-85985-7**

Review written by Mark Daniel (Envieta LLC, USA). (Date: 2012-04-16)**Kenneth Rosen: "Handbook of Discrete & Combinatorial Mathematics (Second Edition)", 1999:**

*The Handbook of Discrete and combinatorial mathematics is THE handbook of discrete mathematics. Edited by a superb team of industry leaders, headed by Kenneth Rosen from AT&T Bell labs, ably assisted by a team of editors which includes Andrew Odlyzko, Ron Gaham etc, one can rest assured that the topics chosen in the handbook is not just academic but also highly practical. it is certainly a valuable resource for mathematicians, scientists and engineers now and in the years to come.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0849301490**

Review written by Kian Tay (Center for Strategic Infocomm Technologies, Singapore). (Date: 2012-03-13)**Gary Chartrand and Ping Zhang: "Chromatic Graph Theory", 2009:**

*In Chromatic Graph Theory, the self-contained book provides fundamentals of graph theory that will allow any reader to pick up the basics after which they will be able to learn advanced and emerging topics of graph coloring. This carefully written book is suitable for anyone who is interested in a solid introduction to graph coloring and also suitable as a follow up course to an elementary graph theory course with an emphasis on graph coloring.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-58488-800-0**

Review written by Yong Hao Ng (Center for Strategic Infocomm Technologies, Singapore). (Date: 2012-03-13)**John Talbot and Dominic Welsh: "Complexity and Cryptography: An Introduction", 2006:**

*A good introductory book for cryptography with an complexity theoretic approach, ideally suited for beginners of cryptography to get a bird's eye view from a complexity theoretical perspective. Also ideal for researchers and students of applications of complexity theory.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-61771-0**

Review written by Sashank Dara (Cisco Systems, India). (Date: 2012-03-13)**Fei Hu and Xiaojun Cao: "Wireless Sensor Networks: Principles and Practice", 2010:**

*This book offers a very good introduction to issues related to wireless sensor networks. It will be useful for researchers, students, and professionals. However, those interested in security aspects of such networks must look elsewhere.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-9215-8**

Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2012-02-02)**N. David Mermin: "Quantum Computer Science", 2007:**

*Quantum Computer Science is a well written text book covering the theoretical aspects of quantum computer science. The monumental algorithms from Shor and Grover are discussed in detail as are a number of other interesting algorithms including those for error correction and quantum cryptography. As a text book it is aimed at the advanced undergraduate or graduate student, but will also be of interest to professionals looking for a clear, concise introduction to this fascinating subject matter. This book is highly recommendable for anyone who wants to learn the theoretical foundations behind quantum computing.*

**Publisher:**Cambridge University Press.**ISBN: 978-0-521-87658-2**

Review written by Gregory Kohring (Inversik Laboratories, Germany). (Date: 2012-01-09)**Martin Dietzfelbinger: "Primality Testing in Polynomial Time", 2004:**

*This book is a very comprehensible introduction to Primality Testing. The book is suitable for a wide range of readers, and I strongly recommend it to anyone interested in basic algorithmic number theory and cryptography based on large prime numbers.*

**Publisher:**Springer.**ISBN: 978-3-540-40344-9**

Review written by Abderrahmane Nitaj (LMNO, Université de Caen Basse Normandie, France). (Date: 2012-01-04)**Richard A. Mollin: "Algebraic Number Theory (Second Edition)", 2011:**

*This is the second edition of an introductory text in algebraic number theory written by a well-known leader in algebra and number theory. This new edition is completely reorganized and rewritten from the first edition. Suitable for advanced undergraduates and beginning graduate students in mathematics, this text offers a good introduction to the fundamentals of algebraic number theory. But unlike standard texts of this level, this text also touches on some applications of algebraic number theory, such as its use in the number field sieve algorithm as well as in primality testing. Numerous extensive biographical sketches of relevant mathematicians are also scattered throughout the book.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-4598-1**

Review written by Fan Junjie, Bertrand (National University of Singapore). (Date: 2011-12-05)**Norman L. Biggs: "Codes: An Introduction to Information, Communication and Cryptography", 2008:**

*This book introduces the recurring themes in coding: economy, reliability, and security in an integrated and even-paced way. Each theme is well motivated and the transition from one to the other feels smooth. The motivation and practical concerns behind the development of the theory are usually presented concisely and clearly. Biggs has given us an inviting first course textbook which hopefully whets the students' appetite to go deeper and wider into the wonderful world of codes.*

**Publisher:**Springer.**ISBN: 978-1-84800-273-9**

Review written by M. Frederic Ezerman (Laboratoire d'Information Quantique, Université Libre de Bruxelles, Belgium). (Date: 2011-11-25)**Nicholas A. Loehr: "Bijective Combinatorics", 2011:**

*This very recent book (590 pages) aims to be an introductory text on bijective combinatorics. I like this book because it covers topics that I had longed to learn. It might seem hard to plough through at first. but if one is patient, one can work through the book and gain great insights into the fertile field of algebraic combinatorics.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-4884-5**

Review written by Kian Tay (Center for Strategic Infocomm Technologies, Singapore). (Date: 2011-11-22)**Ali A. Ghorbani, Wei Lu and Mahbod Tavallaee: "Network Intrusion Detection and Prevention", 2010:**

*The book provides an academic overview of numerous topics related to the theory of network intrusion detection systems. Researchers in the field may find it useful as an annotated guide through the research literature. Others are likely to find it to be less valuable.*

**Publisher:**Springer.**ISBN: 978-0-387-88770-8**

Review written by Mark Daniel (Envieta LLC, USA). (Date: 2011-11-16)**Alexander W. Dent and Yuliang Zheng: "Practical Signcryption", 2010:**

*This book starts from the root of signcryption and covers the latest developments including details of security analyses. It is comprised of chapters written by world-renowned cryptographers and might well serve as a handbook on signcryption. I would certainly recommend this book, for it is not only a valuable source for researchers, but also for practitioners who can benefit from this book as a reference.*

**Publisher:**Springer.**ISBN: 978-3-540-89409-4**

Review written by Amit K Awasthi (Gautam Buddha University, Gr Noida, India). (Date: 2011-11-16)**R. J. Lipton: "The P=NP Question and Gödel’s Lost Letter", 2010:**

*If you are a computer scientist working in another field, looking for a concise account covering the current status of one of the most important questions in the field of computational complexity, this book will almost certainly disappoint you, because apart from a glibly prose, little attempt has been made to reach out to the non-expert. Domain experts on the other hand will probably find this book too superficial to be of much use.*

**Publisher:**Springer.**ISBN: 978-1-4419-7154-8**

Review written by Gregory Kohring (Inversik Laboratories, Germany). (Date: 2011-09-05)**Al Sakib Khan Pathan: "Security of Self-Organizing Networks", 2011:**

*This book offers a good introduction to the security aspects of self-organizing networks, s.a. MANETs, VANETs, WMNs, and WSNs. Though it is written as a collection of self-contained articles, including contributions of over fifty researchers from several countries, this book maintains a uniform style of presentation. I strongly recommend this book as a useful reference work on the security of self-organizing networks for students, professionals, and researchers.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-1919-7**

Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2011-08-16)**Mark S. Merkow and Lakshmikanth Raghavan: "Secure and Resilient Software Development", 2010:**

*This book is a "must read" resource for security experts focusing on application security and for application designers and developers who need to integrate security into their systems. The authors have practical experience in application security and wrote a practice-oriented book. The chapters are well-structured and arranged in a good logical order. I would strongly recommend this book to security architects, security trainers, application designers and developers. But I would not recommend the book for students who might have less security and development knowledge due to missing real-life project experience. The broad content of the book could be quite complicated for students to follow.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-2696-6**

Review written by Emin Islam Tatli (Daimler TSS, Germany). (Date: 2011-08-02)**Syed A. Ahson and Mohammad Ilyas: "Cloud Computing and Software Services - Theory and Techniques", 2011:**

*This book tries to bring clarity into the emerging field of cloud computing by presenting accurate, up-to-date information in a comprehensive manner - unfortunately it does not achieve this goal completely. Not written for beginners, this book discusses general architecture issues coming up with the development of cloud systems and provides technical background knowledge, but security is merely touched. Hence, this book is recommended to readers interested in the deep technical basics of cloud infrastructures and systems.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-0315-8**

Review written by Dominik Birk (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2011-07-06)**Rowan Garnier and John Taylor: "Discrete Mathematics", 2010:**

*In its third edition, Discrete Mathematics, is a mature textbook providing an introduction to those aspects of university level mathematics needed by computer science majors. For the most part, it provides an excellent pedagogical treatment of its subject matter, along with numerous worked exercises. The newly introduced chapter on public key cryptography is exemplary in this respect. Discrete Mathematics is also suitable as a reference book; however, the treatment of most topics is probably too basic to be of immediate use to the practicing professional.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-1280-8**

Review written by Gregory Kohring (Inversik Laboratories, Germany). (Date: 2011-07-01)**Nguyen and Vallee: "The LLL Algorithm", 2010:**

*There has long been a need for a comprehensive and advanced text on lattices, the LLL algorithm, and applications. This book, comprising independent chapters written by a number of different people, authoritatively fills the gap in the literature. It is strongly recommended for students and researchers in lattices or lattice-cryptography. The book is not written for novices, and most chapters assume a solid background in mathematics. But I believe that, with a small amount of additional background reading, it will be valuable even for Masters or beginning PhD students.*

**Publisher:**Springer.**ISBN: 978-3-642-02294-4**

Review written by Steven Galbraith (University of Auckland, New Zealand). (Date: 2011-07-01)**Peter Stavroulakis and Mark Stamp: "Handbook of Information and Communication Security", 2010:**

*Having researchers, graduate students and university instructors as audience in mind, this book aims at providing a structured guide to access the huge field of information and communication security and its topics. However, it achieves this goal only partly, as its strength remains in the individual strength of each chapter. A reader interested in purchasing a copy is therefore recommended to inspect the most targeted chapters in order to evaluate whether this handbook provides the desired content.*

**Publisher:**Springer.**ISBN: 978-3-642-04116-7**

Review written by Kilian David (IT Auditor, Germany) and Luigi Lo Iacono (Cologne University of Applied Sciences, Germany). (Date: 2011-06-24)**Silvia Heubach and Toufik Mansour: "Combinatorics of Compositions and Words", 2010:**

*The book is written in an accessible style, and it is quite easy to use for the non-specialist in the area, given a basic computer science and/or mathematical background. It will be a useful reference for the researcher, as well as a very good textbook for a graduate level course in the area. I recommend the book heartily to both the specialists and the beginning researchers in the area.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-7267-9**

Review written by Serdar Boztas (Royal Melbourne Institute of Technology, Melbourne, Australia). (Date: 2011-06-21)**Borko Furht and Darko Kirovski: "Multimedia Watermarking Techniques and Applications", 2006:**

*An excellent collection of 14 articles from the experts of multimedia watermarking! It includes survey articles that speak to any reader interested in the subject as well as articles that introduce new techniques and applications of digital watermarking appealing to researchers and practitioners in the field.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0-84937-213-1**

Review written by Yesem Kurt Peker (Randolph College, Lynchburg, Virginia, USA). (Date: 2011-06-20)**David Salomon: "Elements of Computer Security", 2010:**

*An excellent book on the essential topic of computer security and privacy for anyone who uses computers and the Internet for computation, communication, or leisurely purposes. It provides the reader with a very good understanding of what the vulnerabilities are, how threats and attacks work as well as tools to prevent and defend against them.*

**Publisher:**Springer.**ISBN: 978-0-85729-005-2**

Review written by Yesem Kurt Peker (Randolph College, Lynchburg, Virginia, USA). (Date: 2011-06-20)**Henri Cohen and Gerhard Frey: "Handbook of Elliptic and Hyperelliptic Curve Cryptography", 2006:**

*This book could have been titled "Mathematics and Mathematical Algorithms for Elliptic and Hyperelliptic Curves, with a Focus on Cryptography." With this clarification, it offers a very comprehensive coverage of this vast subject area, by a total of 16 authors and contributors. Overall a useful and essential treaty for anyone involved in elliptic curve algorithms,***except***if someone looks for definitive technical guidance as in a cookbook.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-58488-518-4**

Review written by Thierry Moreau (CONNOTECH Experts-conseils Inc., Montreal, Canada). (Date: 2011-06-15)**Albert Lozano-Nieto: "RFID Design Fundamentals and Applications", 2011:**

*This book is aimed at professionals with a background in eletronics, such as electrical engineers and (under)graduate students in related fields interested in the design, deployment and maintenance of RFID systems. There is a plentora of technical details, schematic diagrams of circuits, listings of several electrical parameters such as impedance, voltage, inductance, and so on. This book may be of interest to people working on side-channel analysis dedicated to RFID tags, although such attacks are not mentioned in the book.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-9125-0**

Review written by Jorge Nakahara Jr. (Independent Researcher, Brazil). (Date: 2011-06-07)**Giampaolo Bella: "Formal Correctness of Security Protocols", 2007:**

*This book gives a good introduction into proofs of formal correctness for security protocols. You'll learn the approaches and implications of such proofs. Especially the modeling of the use of smartcards is nicely done and explained. However, this book is neither a general introduction into security protocols, nor one into the main-tool, the formal theorem prover Isabelle. All in all, it is a nice book to read, and the ideas, models and proofs will be of great use for anybody, who speciﬁcally looks for formal proofs of security protocols.*

**Publisher:**Springer.**ISBN: 978-3-540-68134-2**

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2011-06-07)**Yan Zhang, Jun Zheng and Honglin Hu: "Security in Wireless Mesh Networks", 2008:**

*The book provides a comprehensive guide to security-related issues in wireless mesh networks with focus on system architectures. It is a good reference text for practitioners and researchers in identify deployment scenarios and future directions in network security. I strongly recommend this book as a handbook of security technologies for wireless networks.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0-8493-8250-5**

Review written by Gloria Tuquerres (Freelance Analyst, The Netherlands). (Date: 2011-06-02)**Richard A. Mollin: "Advanced Number Theory with Applications", 2010:**

*"Advanced Number Theory with Applications" is a wonderful book which covers a huge variety of contemporary number theory topics pitched at an advanced undergraduate or beginning graduate level. Indeed, the book starts off with algebraic number theory and quadratic forms, builds up to Dirichlet's theorems on primes in arithmetic progressions and Diophantine equations, and has for a climatic ending elliptic curves and modular forms. Furthermore, this book is clearly written, and has many exercises (half of them with solutions) for the enthusiast to obtain further understanding of the material presented. I would strongly recommend this book to the keen student interested in advanced number theory!*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-8328-6**

Review written by Bertrand Junjie Fan (Center for Strategic Infocomm Technologies, Singapore). (Date: 2011-06-01)**Fred Roberts and Barry Tesman: "Applied Combinatorics (Second Edition)", 2009:**

*This book is the second edition of a well known textbook, and the new edition (200 pages more) covers all the major topics in combinatorics in a single accessible volume. Many new examples are given. Hence it is useful to undergraduates and graduate students in computer science, math and engineering. The presentation flows very smoothly and the proofs are carefully written. There is a large number of exercises to test one's understanding. There is also an extensive index of authors and subjects and a long list of references. This book is a gem. Get it!*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-9982-9**

Review written by Kian Tay (Center for Strategic Infocomm Technologies, Singapore). (Date: 2011-05-27)**Martin Erickson and Anthony Vazzana: "Introduction to Number Theory", 2008:**

*Introduction to Number Theory is a well-written book on this important branch of mathematics, and the clear, almost story-like structure makes it easy to follow. As a plus, every chapter is correlated with interesting anecdotes about famous mathematicians from the past that gave important contributions to number theory, such as Euler, Gauss, or Euclid. The book is suitable for a wide range of readers, and I strongly recommend it to anyone interested in number theory.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-58488-937-3**

Review written by Edoardo Persichetti (University of Auckland, New Zealand). (Date: 2011-05-24)**Alexander Stanoyevetich: "Introduction to Cryptography", 2011:**

*This book is a very comprehensible introduction to cryptography. It will be very suitable for undergraduate students. The author has provided numerous mathematically oriented as well as computer-based exercises. I strongly recommend this book as an introductory book on cryptography for undergraduates.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4398-1763-6**

Review written by S.V. Nagaraj (RMK Engineering College, Kavaraipettai, Tamil Nadu, India). (Date: 2011-05-12)**Christiane Rousseau and Yvan Saint Aubin: "Mathematics and Technology", 2008:**

*This book explains how technologies make use of different mathematical fields. It explores technologies such as robotic arms, cryptography, Google's PageRank or DNA computing. Each chapter introduces some dedicated field. I would recommend this book to mathematics teachers who want to shed some lights on practical use of mathematics. Students may find a source of new exercises (but without proposed solutions).*

**Publisher:**Springer.**ISBN: 978-0-387-69215-9**

Review written by Eric Diehl (Security & Content Protection Labs, Technicolor, Rennes, France). (Date: 2011-05-12)**Asoke K. Talukder and Manish Chaitanya: "Architecting Secure Software Systems", 2009:**

*This book focuses on both theoretical and practical aspects of designing secure software systems. While its theory part is quite well-written, its practical part is not well-structured. I would strongly recommend it to people who need to get only an overview of secure software design, but not for security experts who want to study a specific topic in detail.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-8784-0**

Review written by Emin Islam Tatli (IBM Germany). (Date: 2011-04-13)**Jack Koolen, Jin Ho Kwak and Ming-Yao Xu (Eds.): "Applications of Group Theory to Combinatorics", 2008:**

*A book written for an advanced audience, in the style of a "handbook", it is a good reference text for an expert in graph or design theory, who is looking for tools from group theory, particularly combinatorial group theory.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0-415-47184-8**

Review written by Asha Rao (Royal Melbourne Institute of Technology, Melbourne, Australia). (Date: 2011-04-13)**Wenke Lee, Cliﬀ Wand and David Dagon: "Botnet Detection", 2008:**

*''Botnet Detection - Countering the largest Security Threat'' is a collection of eight excellent research papers. It is not a textbook on botnet detection where the reader is led from the basics to advanced topics. So the book can be only recommended to a reader with some background on botnets and their behavior.*

**Publisher:**Springer.**ISBN: 978-1-387-68766-7**

Review written by Joerg Gerschuetz (International School of IT Security, Bochum, Germany). (Date: 2011-03-07)**Jonathan Katz and Yehuda Lindell: "Introduction to Modern Cryptography", 2008:**

*Introduction to Modern Cryptography provides a very well-balanced and thorough introduction to cryptography. This*it*book highlights precise definitions and rigorous proofs that have shaped cryptography into its current mathematically enriched form. It covers fundamental notions of modern cryptography ranging from public, private key encryption to data integrity and signatures. This is a must-read for researchers in cryptography.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-584-885-511**

Review written by Ladan Mahabadi (McGill University, Melbourne, Canada). (Date: 2011-03-01)

A previous review of this book by Cristina Onete can be found here. (Date: 2010-01-13)

**B. Schneier: "Beyond Fear", 2006:**

*This book is about security in general. In contrast to many other books, Schneier explains how security works in the most general case, starting from protecting the diary of your sister to protecting the nation from global terrorism. Schneiers book does not focus on cryptography or network security, instead it uses examples of systems everyone is expected to be familiar with, e.g. airport security. The book entertains the reader and encourages him thinking rational about security threads and security solutions. I would recommend the book to everybody who starts working in the security business, but not for readers who are searching for technical details about any kind of security systems.*

**Publisher:**Springer.**ISBN: 978-0-387-02620-6**

Review written by Erik Tews (TU Darmstadt, Germany). (Date: 2010-11-03)**J. Smith: "Introduction to Abstract Algebra", 2008:**

*This is a careful treatment of the principal topics of Abstract Algebra in 327 pages. Taking a different approach from several books, it helps the reader to have a solid introduction to abstract algebra and establishes the link between it and the cryptographic world in many "Study projects". This is an attractive book which could be read by everybody because the author supposes not so much knowledge from the reader and gives all the necessary information to continue the reading from a chapter to the next. I believe that the readers, students and even experienced researchers may benefit strongly from this book.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-6371-4**

Review written by Frederic A.B. Edoukou (CCRG, Nanyang Technical University, Singapore). (Date: 2010-10-11)**A. Joux: "Algorithmic Cryptanalysis", 2009:**

*Algorithmic Cryptanalysis is a high level book that covers many interesting topics, so it is impossible to go into all details of the different topics. However, for each topic the reader can ﬁnd several references, which is a convenient extra of the book. I would recommend this book for graduate students with a strong mathematical background, a cryptographic background, knowledge in C-programming and an interest in implementing cryptanalytic attacks.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-7002-6**

Review written by Julia Borghoff (DTU Mathematics, Technical University of Denmark). (Date: 2010-10-07)**C. Paar and J. Pelzl: "Understanding Cryptography", 2010:**

*This book does not make any assumptions on prior knowledge in neither mathematics nor computer science. It is therefore not only suited for undergraduate students in mathe- matics or in the computer science ﬁeld, but rather also for students from other domains requiring crypto skills such as legal people for example. I would certainly recommend this book for the audience it is targeting.*

**Publisher:**Springer.**ISBN: 978-3-642-04100-6**

Review written by Luigi Lo Iacono (European University of Applied Sciences). (Date: 2010-10-07)**S. Mangard, E. Oswald and T. Popp: "Power Analysis Attacks: Revealing the Secrets of Smart Cards", 2007:**

*This book provides a very clear, complete and highly illustrated presentation of power analysis methods used to extract secret information from cryptosystems such as smart cards. All concepts are progressively introduced, mathematically analyzed and illustrated using many real attacks results. The main attack methods and some variants as well as standard countermeasures are presented and their limitations and efficiency aspects are discussed. Both software and hardware implementations on smart cards are targeted. I highly recommend this very nice book.*

**Publisher:**Springer.**ISBN: 978-0-387-30857-9**

Review written by Arnaud Tisserand (CNRS, IRISA Laboratory, Lannion, France). (Date: 2010-10-07)**M. Higgins: "Number Story: From Counting to Cryptography", 2008:**

*Numbers are a fascinating and interesting subject, and what an interesting book Higgins has written about them! Mainly aimed at the non-technical reader, but also suitable for those more familiar with mathematics, the text is a grand overview of numbers and their history. Every chapter is filled with facts, anecdotes, examples and tricks that will keep the curiosity of the reader alive till the very last page.*

**Publisher:**Springer.**ISBN: 978-1-84800-000-1**

Review written by Paolo Palmieri (UCL Crypto Group, Université catholique de Louvain, Belgium). (Date: 2010-09-29)**Ross Anderson: "Security Engineering: A Guide to Building Dependable Distributed Systems" (2nd Edition), 2009:**

*This book, as a whole or the relevant chapters and sections, is morally a must-read for anyone who is involved in the design or implementation of security relevant systems, or who is responsible for the operation or the management of such systems.*

**Publisher:**Wiley.**ISBN: 978-0-470-06852-6**

Review written by Safuat Hamdy (Secorvo Security Consulting GmbH, Karlsruhe, Germany). (Date: 2010-08-12)**E. Damiani, C. A. Ardagna, and N. El Ioini: "Open Source Systems Security Certification", 2009:**

*I recommend this book to everyone who is interested in the topic of security certification applied to open source systems. The authors provide detailed descriptions on the merits and pitfalls of the security certification process (e.g. Common Criteria, ICSA, etc.) in the context of dynamically changing open source software systems (e.g. the Linux kernel), as well as some in-depth case studies and open research challenges. The book is very well-structured and provides a good overview with lots of additional readings on all areas involved in this red-hot topic*

**Publisher:**Springer.**ISBN: 978-0-387-77323-0**

Review written by Meiko Jensen (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2010-08-06)**Yan Zhang and Paris Kitsos: "Security in RFID and Sensor Networks", 2009:**

*This 24-chapter long book consists of disjointed scientific papers that focus more towards implementation and feasibility, and thus the presented topics refer mostly to improvements that are scalable and implementable. The editors did a great job of putting these chapters together in a more-or-less logical order, and such that the topics share some common ground. I particularly liked the good amount of detail regarding RFID hardware and the feasibility of the constructions. A disadvantage of this book -- and a natural one in my opinion, given the diversity of the topics -- is the lack of depth and the somewhat implementation-based approach taken by most chapters. I was also surprised to see that very few chapters actually contain any formal definitions or models. Nevertheless, I would certainly recommend this book, particularly to those who are already familiar with theoretical deﬁnitions and models related to the cryptographic primitives and security notions that are paramount in RFID and sensor networks.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-6839-9**

Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2010-07-21)**Jie Wang: "Computer Network Security", 2009:**

*The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security.*

**Publisher:**Springer.**ISBN: 978-3-540-79697-8**

Review written by Mario Strefler (Ecole Normale Supérieure, Paris, France). (Date: 2010-07-21)**H. Stichtenoth: "Algebraic Function Fields and Codes" (2nd Edition), 2008:**

*Stichtenoth’s book is the canonical modern textbook for the ﬁeld-theoretic formulation of the theory of curves over ﬁnite ﬁelds. The book is carefully written, develops the theory rigorously from ﬁrst principles, and contains elegant algebraic proofs of a number of very important facts. The reader is required to have a solid background in algebra, hence the book is appropriate for beginning PhD students, or Masters students doing projects in the subject. The book is an excellent companion for students learning the theory of curves. For researchers in the ﬁeld it is a convenient reference for proofs and deﬁnitions. I consult my copy of the ﬁrst edition regularly.*

**Publisher:**Springer.**ISBN: 978-3-540-76877-7**

Review written by Steven Galbraith (University of Auckland, New Zealand). (Date: 2010-06-18)**M.W. Baldoni, C. Ciliberto, and G.M. Piacentini Cattaneo: "Elementary Number Theory, Cryptography and Codes", 2009:**

*The book is an almost classical treatment of number theory and its applications to cryptography and coding theory. It involves more abstract notions than a classical elementary number theory book does and requires the reader to be familiar with certain algebraic structures. A prerequisite to fully benefit from this book would be a course in abstract algebra. I would recommend the book to various readers though the book speaks more to a mathematically mature reader who has a good understanding of abstraction.*

**Publisher:**Springer.**ISBN: 978-3-540-69199-0**

Review written by Yesem Kurt Peker (Randolph College, Lynchburg, Virginia, USA). (Date: 2010-06-07)**Kim-Kwang R. Choo: "Secure Key Establishment", 2009:**

*This book is targeted for researchers interested in designing secure cryptographic protocols. It begins with analysing and criticising previous security models for protocols and ends with tools to design better protocols. I would recommend this book, since it is a very valuable reference for me.*

**Publisher:**Springer.**ISBN: 978-0-387-87968-0**

Review written by Lakshmi Kuppusamy (Queensland University of Technology, Brisbane, Australia). (Date: 2010-06-07)**Noureddine Boudriga: "Security of Mobile Communications", 2009:**

*This book explores security features related to IP-mobility, mobile payments, multimedia applications, VoIP, and SIM-like cards. It includes information about various attacks and architectures capable of providing security features such as authentication, authorization, and access control in mobile communication systems. For this reason I recommend the book as a good resource for those interested in identifying and solving security issues in mobile communication systems and as a starting point for research in secure mobile communication.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-0-8493-7941-3**

Review written by S.V. Nagaraj, (Hadhramout University, Yemen). (Date: 2010-06-07)**Richard A. Mollin: "Codes: The Guide to Secrecy from Ancient to Modern Times", 2005:**

*This book is an encyclopedic work of a very high standard covering the most widely known and used cryptographic codes throughout history up until 2004 (book published in 2005). As well as describing cryptographic codes, there are pictures and biographies of key personnel in the field, as well as exercises and problems which may be used for creating courses that will reference this book.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-584-884-705**

Review written by Kenneth J. Radke (Queensland University of Technology, Brisbane, Australia). (Date: 2010-05-27)**Hans Delfs and Helmut Knebl: "Introduction to Cryptography, Principles and Applications" (2nd Edition), 2007:**

*I really enjoyed reading this book and I recommend it for students who have very basic understanding of cryptography and want to know more about mathematical basis and deeper concepts underlying cryptography. People who are focused more on topics like security management, system security, and network security are suggested to look for other books for introduction to cryptography.*

**Publisher:**Springer.**ISBN: 978-3-540-49243-6**

Review written by Hasan Mirjalili, (École Polytechnique Fédérale de Lausanne, Switzerland). (Date: 2010-05-27)**Kerstin Lemke, Christof Paar, and Marko Wolf (Eds.): "Embedded Security in Cars", 2006:**

*Although this book was published around four years ago, it remains a very timely summary of security considerations in automotive electronics specification, design and use. Much of the material can be applied generically to embedded electronics, but there are also specific problems in vehicle electronics that need special attention. In any case, this book is an excellent security primer for those working in automotive electronics, and its lessons can be applied to many areas of embedded design beyond that. I commend it.*

**Publisher:**Springer.**ISBN: 978-3-540-28384-6**

Review written by Andrew Waterhouse, (Pacific Research, Sydney, Australia). (Date: 2010-04-13)**Lawrence C. Washington: "Elliptic Curves - Number Theory and Cryptography" (2nd Edition), 2008:**

*This book presents the theory of elliptic curves from the ground up leading to advanced topics of that area, including several parts on number theory. It is written in a dense style and is most suited for cryptographers and mathematicians. The book is a very valuable reference and qualifies for self-study. After digesting the book, the reader will have a thorough knowledge on elliptic curves as well as number theory. Half of the book will already be enough for most students and engineers.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-7146-7**

Review written by Vincent C. Immler (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2010-04-12)**Richard A. Mollin: "Fundamental Number Theory with Applications" (2nd Edition), 2008:**

*This book, written by a well-known Canadian number theorist, is intended for a one-semester undergraduate introductory course in number theory. Therefore, only undergraduates and the occasional dilettante (which may include professionals from affine branches of science who need this or that elementary result) will find it useful. The presentation flows smoothly and the main results can be perused quickly, although, to gain a deeper understanding, more time has to be devoted to their study. I have found the biographical sketches, with their anecdotical flavor, to be very interesting (it is the lesson I got from this book).*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-6659-3**

Review written by Francesco Sica (University of Calgary, Canada). (Date: 2010-04-12)**Joachim Biskup: "Security in Computing Systems", 2009:**

*The book tries to focus on the essentials of secure computing and aims to provide a collection of the most promising security mechanisms. To a large extent the book achieves this objective and this is one reason why I recommend this book. It is best suited for readers with a strong background in various aspects of securing computer systems.*

**Publisher:**Springer.**ISBN: 978-3-540-78441-8**

Review written by S.V. Nagaraj, (Hadhramout University, Yemen). (Date: 2010-04-12)**Jintai Ding, Jason E. Gower, Dieter S. Schmidt: "Multivariate Public Key Cryptosystems", 2006:**

*This book gives an overview of multivariate cryptography. It presents both multivariate schemes and attacks against them in great detail and contains many toy examples for them. The book is suitable both for master students and as a starting point for young researchers who want to start their own work in this new field of cryptography. Unfortunately, some of the more recent developments in multivariate cryptography are not contained in the book.*

**Publisher:**Springer.**ISBN: 978-0-387-32229-2**

Review written by Albrecht Petzold (TU Darmstadt, Germany). (Date: 2010-04-12)**Joseph Migga Kizza: "Guide to Computer Network Security", 2009:**

*This book gives a limited overview about ``Computer Network Security''. Although it gives a good historic overview about the topics mentioned it lacks a bit of up-to-dateness. Since most of the relevant topics are covered but only reviewed superficially the book is adequate for practitioners or undergraduates but not suitable for researchers. As a nice feature, the author offers additional comprehensive documents on his homepage (like a syllabus and complete set of Powerpoint slides covering a 15-week-course). An additional benefit is also given through the advanced exercises and complex projects at the end of each chapter.*

**Publisher:**Springer.**ISBN: 978-1-84800-916-5**

Review written by Kilian David (IT Auditor, Germany). (Date: 2010-03-19)**Gildas Avoine, Philippe Oechslin, Pascal Junod: "Computer System Security: Basic Concepts and Solved Exercises", 2007:**

*This book presents about 100 solved exercises on 8 main topics of Computer System Security. Each topic is briefly introduced before proposing the exercises. The exercises test your theoretical knowledge and your ability to solve more pragmatic problems through a few complex exercises.*

**Publisher:**EPFL Press.**ISBN: 978-1-420-04620-5**

Review written by Eric Diehl (Security Competence Center, Thomson, Rennes, France). (Date: 2010-03-19)**Çetin Kaya Koç: "Cryptographic Engineering", 2009:**

*This book is the first complete introduction to a Cryptographic Engineering. It addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. I really recommend Cryptographic Engineering to students and engineers working on implementations of cryptography in real life. As a cryptographic hardware level (ASIC and FPGA) designer, I am going to use this book as a reference in my daily work.*

**Publisher:**Springer.**ISBN: 978-0-387-71816-3**

Review written by Azzeddine Ramrami (CryptoDisk, France). (Date: 2010-03-12)**Serge Vaudenay: "A Classical Introduction to Cryptography: Applications for Communications Security", 2006:**

*This book is aimed at bridging the gap between cryptography and its standard applications. Most of the sections are rich in theory and hence, from my point of view, this is more suitable for research than for industry purposes. For me, it is one of the most precious books that I ever had and will always be on my shelf for any quick reference.*

**Publisher:**Springer.**ISBN: 978-0-387-25464-1**

Review written by Jothi Rangasami (Queensland University of Technology, Brisbane, Australia). (Date: 2010-03-12)**Frank Nielsen: "A Concise and Practical Introduction to Programming Algorithms in Java", 2005:**

*The book at hand by Frank Nielsen is a textbook mainly targeted to undergraduate students as a very first course in programming. Following the demands of the targeted audience, the book introduces the topics programming and algorithms without requiring prior knowledge. More advanced topics and concepts such as for example object orientation are intentionally omitted in order to stay focused with the book’s goal. This book is not only a valuable source for undergraduate students but also for lecturer who can benefit from this book in terms of a source for many programming examples and exercises.*

**Publisher:**Springer.**ISBN: 978-1-84882-338-9**

Review written by Luigi Lo Iacono (NEC Laboratories Europe, Heidelberg, Germany). (Date: 2010-03-09)**Jürgen Rothe: "Complexity Theory and Cryptology - An Introduction to Cryptocomplexity", 2005:**

*This book about complexity theory and its application in modern cryptology is interesting and highly valuable for educational purposes, mainly because it yields a new and ingenious way to access modern cryptographic research results. The target audience comprises undergraduate and graduate students in computer science, mathematics, and engineering, but the book is also recommended reading (and a valuable source of information) for researchers, university teachers, and practitioners working in the ﬁeld. Furthermore, it is exceptionally well suited for self-study. This makes the book so unique that it should be part of any library on cryptology or complexity theory.*

**Publisher:**Springer.**ISBN: 978-3-540-22147-0**

Review written by Rolf Oppliger (eSECURITY Technologies and University of Zurich, Switzerland). (Date: 2010-03-09)**Jürgen Rothe: "Komplexitätstheorie und Kryptologie - Eine Einführung in die Kryptokomplexität", 2008:**

*Das zur Diskussion stehende Buch ist die deutschsprachige Übersetzung des Buches Complexity Theory and Cryptology - An Introduction to Cryptocomplexity (s.o.). Es behandelt die Komplexitätstheorie bzw. deren Anwendung in der Kryptologie und ist aus didaktischer Sicht wertvoll, weil es insbesondere einen neuen und in seiner Art auch einzigartigen Zugang zu Forschungsresultaten der modernen Kryptograﬁe verschafft. Das Buch wendet sich an Studenten und Studentinnen der Informatik, der Mathematik und des Ingenieurwesens. Natürlich kann das Buch auch Forschern, Dozierenden und Praktikern empfohlen werden. Schliesslich eignet sich das Buch auch zum Selbststudium. Vom Thema und Aufbau her ist das Buch so einzigartig, dass es in jede Bibliothek über Kryptologie oder Komplexitätstheorie gehört.*

**Publisher:**Springer.**ISBN: 978-3-540-79744-9**

Review written by Rolf Oppliger (eSECURITY Technologies and University of Zurich, Switzerland). (Date: 2010-03-09)**Dirk Henrici: "RFID Security and Privacy", 2008:**

*This book presents the topic of RFID Security and Privacy in the framework of pervasive computing. Written in a dense style, which requires careful digestion and analysis, this book presents a novel and very useful picture of an outspread RFID system with many tag owners and tags, interacting in a standardised infrastructure. I would strongly recommend this book to anyone interested in an in-depth study of the potential uses and constraints of large-scale RFID authentication. A preferred target would be academic researchers in this field, although the practical considerations included in this work may interest industry research labs as well.*

**Publisher:**Springer.**ISBN: 978-3-540-79075-4**

Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2010-03-09)**Martin Aigner, Günter M. Ziegler: "Proofs from THE BOOK, 4th Edition", 2010:**

*"The Book", as promulgated by Paul Erdős, is God's collection of the most elegant proofs of any and all mathematical theorems, including those still to be discovered. In "Proofs from THE BOOK" Martin Aigner and Günter M. Ziegler attempt to gather together a collection of proofs which, in their opinion, should be included in "The Book". Browsing through the proofs one gets a sense of the rich creative process involved in proving theorems. "Proofs from THE BOOK" is written in a relaxed style which can be best described as a blend between a university level textbook and an article from Scientific American. It is highly recommendable, for unlike many popularizations of science and mathematics, it delves into real theorems not muddy metaphors or inconsistent analogies.*

**Publisher:**Springer.**ISBN: 978-3-642-00855-9**

Review written by Gregory Kohring (Freelance Analyst, Germany). (Date: 2010-03-09)**Douglas Jacobson: "Introduction to Network Security", 2009:**

*This book gives a good overview on Network Security. It starts from the lower layer and shows how each other layer can contribute to the overall security of the system. On the one hand students in Computer Science / Network Security might be interested in this book and on the other hand security professionals can use it as a convenient reference book. It won't get dusty on my shelf, as it contains so many precious information, and is enjoyable to read.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-58488-543-6**

Review written by Olivier Blazy (Ecole Normale Supérieure, Paris, France). (Date: 2010-02-01)**Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor: "Terrorism Informatics", 2009:**

*The book gives a good state of the art of the Terrorism Informatics field, focusing mainly on methodological issues in the first part and on how to handle suspicious data on the second. Its audience is very broad: on the one hand, specialists (scientific, experts, policy makers) can find useful information, on the other hand, the book is really accessible to students.*

**Publisher:**Springer.**ISBN: 978-0-387-71612-1**

Review written by Olivier Blazy (Ecole Normale Supérieure, Paris, France). (Date: 2010-01-21)**Jonathan Katz, Yehuda Lindell: "Introduction to Modern Cryptography", 2008:**

*This book is a comprehensive, rigorous introduction to what the authors name ''Modern'' Cryptography. One of the book's best qualities is the remarkably logical and systematic style in which the authors present several cryptographic primitives and constructions. A disadvantage of this book in my opinion is that it does not delve deeper into cryptographic methods such as authentication with limited resources, such as RFID, or PUF-based authentication. The reader must be familiar with some basic mathematical concepts and the science of proving statements, thus this book is not suited for the industry but rather for graduate students. However, even a versed cryptographer will benefit from the rigorous and complete treatment of the mentioned topics. I would heartily recommend this book to anyone who is interested in cryptography.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-58488-551-1**

Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2010-01-13)

Another review of this book by Ladan Mahabdi can be found here. (Date: 2011-03-01)**Gregory V. Bard: "Algebraic Cryptanalysis", 2009:**

*This book introduces the predominant topics in multivariate-base cryptanalysis. It can be described to be a complementary text book in the ﬁeld of algebraic attack as a result of the author's experience and knowledge. For a person who did not know much about algebraic cryptanalysis, this book is a good starting point.*

**Publisher:**Springer.**ISBN: 978-0-387-88756-2**

Review written by Wael Said Abdel mageed Mohamed (Cryptography and Computeralgebra, Informatik, TU Darmstadt, Germany). (Date: 2010-01-13)

Another review of this book by Rusydi Hasan Makarim can be found here. (Date: 2013-09-23)**Friederich L. Bauer: "Historische Notizen zur Informatik"**, 2009:*(German)*

*This book is a collection of trivia about the history of computer science and mathematics. You can learn this and that from it, but it is nevertheless a book to enjoy reading. Maybe a nice gift to everybody from this field who likes to read.*

**Publisher:**Springer.**ISBN: 978-3-540-85789-1**

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2010-01-12)**M. Jason Hinek: "Cryptanalysis of RSA and its Variants", 2010:**

*This book sums up traditional attacks on RSA and gives a lot of information about the newer lattice-based attacks. It uses a lot of mathematics, but explains it pretty well. It seems like a very good book to get an overview over attacks on RSA.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-7512-2**

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2010-01-08)**Song Y. Yan: "Primality Testing and Integer Factorization in Public-Key Cryptography", 2009:**

*The author knows how to show that "the theory of numbers is one of the most beautiful and pure parts of mathematics" and how to fascinate the reader for this subject. The book can be recommended without any restrictions. It is suitable as text book and/or reference book for anybody interested in Primality Testing or Integer Factorization being student, researcher or amateur. This book will definitely not get dusty in the reviewer's book shelf!*

**Publisher:**Springer.**ISBN: 978-0-387-77267-7**

Review written by Joerg Gerschuetz (International School of IT Security, Bochum, Germany). (Date: 2010-01-07)**Yan Sun, Wade Trappe and K.J.R. Liu: "Network-Aware Security for Group Communications", 2008:**

*This book gives an introduction to group key management protocols in different network settings. It can be recommended to early researchers in the areas of group key management, secure multicast and secure communication in sensor networks. The book discusses various security issues in group communications in a network-aware approach. However, it fails to show how to rigorously analyze group key management protocols with respect to these identified security issues.*

**Publisher:**Springer.**ISBN: 978-0-387-68846-6**

Review written by Choudary Gorantla (Information Security Institute, Queensland University of Technology, Australia). (Date: 2010-01-06)**Darel W. Hardy, Fred Richman, and Carol L. Walker: "Applied Algebra - Codes, Ciphers, And Discrete Algorithms", 2009:**

*The book introduces algebraical concepts which are used in cryptography and coding and shows their applications in these fields. The strength of the book is clearly the number of examples which on the other side in some case unfortunately leads to a lack of general definitions and theorems. Therefore this book is suitable for student who prefer learning by doing (the book provides many exercise) but is not suitable as a handbook. I would also not recommend the book for mathematics student or students which already have a good mathematical background or a strong background in cryptography or coding as they would know already large parts of the book.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN: 978-1-4200-7142-9**

Review written by Julia Borghoff (DTU Mathematics, Technical University of Denmark). (Date: 2010-01-05)**Johannes Buchmann: "Introduction to Cryptography", 2004:**

*As the title states the book by Johannes Buchmann provides an introduction to cryptography. It gives a general mathematical background in the beginning and particular mathematical preliminaries are provided at the time they are needed to understand some specific cryptographic method. This text is recommended for undergraduate students or readers who want to get an overview of some modern cryptographic methods and their mathematical preliminaries, like for example RSA and DES.*

**Publisher:**Springer.**ISBN: 0-387-21156-X**

Review written by Mohamed Saied Emam Mohamed (Technical University of Darmstadt, Germany). (Date: 2010-01-05)**Michael Hafner and Ruth Breu: "Security Engineering for Service-Oriented Architectures", 2009:**

*The book by Hafner and Breu gives an overview on how to systematically design and realize security-critical service-based applications following the model-driven development methodology. Whenever the book talks about SOA or services, it is talking about the technical realisation of SOA using SOAP and related technologies and standards. Currently the audience mainly benefiting from this book is regarded students and researchers.*

**Publisher:**Springer.**ISBN: 978-3-540-79538-4**

Review written by Luigi Lo Iacono (NEC Laboratories Europe, Heidelberg, Germany). (Date: 2009-12-04)**Peter H. Cole and Damith C. Ranasinghe: "Networked RFID Systems and Lightweight Cryptography", 2008:**

*This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains. Written in a fluent, but not overworded fashion, this work represents both a good starting point for students beginning to work in the area of RFID, and a reference for those who are rather more advanced in this field. It provides a great background for those interested in the topic of RFID in general and supply-chain-RFID in particular. A preferred target audience would be researchers in this field, rather than those working in the industry. Further study of the various references quoted in the book is not only recommendable, but necessary, as the authors present only succinctly the topic of other papers or books.*

**Publisher:**Springer.**ISBN: 978-3-540-71640-2**

Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2009-12-04)**F.L. Bauer: "Decrypted Secrets - Methods and Maxims of Cryptology", 2009:**

*As the subtitle reveals, the book discusses different methods and maxims of cryptology. This book can be recommended to everyone who has mathematical, informatical, historical or linguistic interests in cryptography. There are different ways of approaching this book. Due to its vivid style, it can be read linear as a novel, but it can also be used as reference work for specific topics.*

**Publisher:**Springer.**ISBN: 978-3-540-24502-5**

Review written by Denise Reinert (ISEB---Institute for Security in E-Business, Ruhr University, Bochum, Germany). (Date: 2009-11-22)**F.L. Bauer: "Entzifferte Geheimnisse - Methoden und Maximen der Kryptologie"**, 2009:*(German)*

*Wie der Untertitel bereits verrät, behandelt das Buch Entzifferte Geheimnisse verschiedene Methoden und Maximen der Kryptologie. Dieses Buch ist für jeden empfehlenswert, der sich aus mathematischer, informationstechnischer, historischer oder sprachlicher Sicht für Kryptographie interessiert. Dabei gibt es verschiedene Herangehensweisen, das Buch zu lesen. Durch den lebhaften Stil kann es durchaus linear als Roman gelesen werden, jedoch ist es auch als Nachschlagewerk für einzelne Bereiche geeignet.*

**Publisher:**Springer.**ISBN: 978-3-540-67931-8**

Review written by Denise Reinert (ISEB---Institute for Security in E-Business, Ruhr University, Bochum, Germany). (Date: 2009-11-22)**Massimiliano Sala, Teo Mora, Ludovic Perret, Shojiro Sakata, and Carlo Traverso (Editors): "Gröbner Bases, Coding, and Cryptography", 2009:**

*The book edited by Max Sala and other renowned experts is a collection of chapters and small notes devoted to the topic of application of Gröbner bases in coding and cryptography. Gröbner bases appeared in 1960s and nowadays is an established tool in computational algebra. Quite recently applications of this technique have been found in coding theory (decoding, fining minimum distance) and cryptology (multivariate-based cryptography, algebraic cryptanalysis). This book has all the material needed to get an overview of the exciting area.*

**Publisher:**Springer.**ISBN: 978-3-540-93806-7**

Review written by Stanislav Bulygin (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2009-11-22)**Keith Mayes and Konstantinos Markantonakis (editors): "Smart Cards, Tokens, Security and Applications", 2008:**

*This book is an introduction to the world of smart cards and secure components. It describes some of the main applications using smart cards: mobile phone, banking, Pay TV and ID cards. It briefly explores advanced topics such as life cycle management, development environments (Java card, MultOS, SIM toolkit, ...) or Common Criteria. If you're looking for a quick tour about smart cards, then this may be your book.*

**Publisher:**Springer.**ISBN: 978-0-387-72197-2**

Review written by Eric Diehl (Security Competence Center, Thomson, Rennes, France). (Date: 2009-11-10)**Abhishek Singh and Baibhav Singh: "Identifying Malicious Code Through Reverse Engineering", 2009:**

*This book gives a little introduction into assembly, shows how a PE looks like, how vulnerabilities look like in assembly code and shows you some stumbling blocks when reverse-engineering code. It is full of spelling mistakes and does not cover the topic the title promises.*

**Publisher:**Springer.**ISBN: 978-0-387-09824-1**

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2009-11-03)**Carlos Cid, Sean Murphy, and Matthew Robshaw: "Algebraic Aspects of the Advanced Encryption Standard", 2006:**

*In their book the authors give an algebraic perspective of the Advanced Encryption Standard (AES). The way the book is written is overall pleasant. The reader who is ok with mathematical language should have no problem reading it. The material is not overwhelmed with heavy mathematical results/proofs/notions. Considering that the book contains also necessary mathematical background overview, it is readable for engineers and cryptographers without a particular pre-knowledge of algebra.*

**Publisher:**Springer.**ISBN:**978-0-387-24363-4

Review written by Stanislav Bulygin (CASED - Center for Advanced Security Research Darmstadt, Germany). (Date: 2009-11-02)**Song Y. Yan: "Cryptanalytic Attacks on RSA", 2008:**

*The book is the state of the art encyclopedia of RSA encryption algorithm. It is well-structured and can be used as lecture notes for any university cryptographic course or student research project. It is the most relevant and self-explanatory book about RSA and is very helpful for students and teachers.*

**Publisher:**Springer.**ISBN:**978-0-387-48741-0

Review written by Yuriy R. Aydarov (Perm State University, Russia). (Date: 2009-11-02)**Adam J. Elbirt: "Understanding and Applying Cryptography and Data Security", 2009:**

*And now how do I implement that? If you have some day wondered how to implement your cryptographic result, this book is here to help you... From symmetric-key to public-key cryptography, from signatures to MAC, you'll may find the answer you are looking for in there.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN:**978-1-4200-6160-4

Review written by Olivier Blazy (Ecole Normale Supérieure, Paris, France). (Date: 2009-11-01)**Karl de Leeuw and Jan Bergstra (editors): "The History of Information Security - A Comprehensive Handbook", 2007:**

*This magisterial book, of almost 900 pages, has joined Kahn, Yardley and Welchmann on my shelf of serious reference works. Yet it contains much that I found new, surprising and even delightful, despite a quarter century of working in the field.*

**Publisher:**Elsevier.**ISBN:**978-0444516084

Review written by Ross Anderson (University of Cambridge, Computer Laboratory). (Date: 2009-10-27)**Shiguo Lian: "Multimedia Content Encryption: Techniques and Applications", 2009:**

*This book gives a good starting point for research concerning the special requirements multimedia content has of cryptography. It takes various types of encryption, compression, watermarking and fingerprinting into account. Readers with background in cryptography and interest in the topic of multimedia encryption should be satisfied.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN:**978-1-4200-6527-5

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2009-10-20)**Gabriel Valiente: "Combinatorial Pattern Matching Algorithms in Computational Biology using Perl and R", 2009:**

*The book holds what its cover promises: It is a well-sorted collection of pattern matching algorithms that are used to work with problems in computational biology. Only shortcoming is the missing runtime-analysis. All in all, it is recommended, in particular for students of computational biology or bioinformatics.*

**Publisher:**CRC Press/Taylor & Francis Group.**ISBN:**978-1-4200-6973-0

Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (Date: 2009-10-07)