International Association for Cryptologic Research
IACR logo

List of Books for Review

If you are interested in writing a review or have any other question regarding the IACR book reviewing system, please contact Edoardo Persichetti (Dakota State University, USA) via books at iacr.org. New book reviews are posted continuously.

If you are interested in reviewing a book from Cambridge University Press, CRC Press/Taylor & Francis Group, PPUR or Springer that is not listed below, it is possible to do so, provided there is no review for it already. Please check the books with a completed review page and then send me an email if this is the case.

Reviewing Guidelines

So, what should a review look like? Keep in mind that your review should be helpful for the reader. So summarize its content and then give examples for good and bad parts. Give an overall conclusion (e.g. this book could be particular helpful for the following group, is over the top / too easy for...). If your review is longer than the book or shorter than the text on its back, something went wrong, thus we recommend to keep it between 2-5 pages. Apart from that, there are no guidelines. Just start reviewing and assume you would be reading your review. Would you like it? So the key questions are:
  • What is this book about (summary)?
  • What is the book like (style)?
  • Would you recommend this book (if yes: for whom?)?
  • Would your review be helpful for yourself?
The preferred format is PDF. You can look at previous reviews to have an idea of what a review should look like, and you are encouraged to use our LaTeX-Template. In addition, I need a 3-10 line "teaser" which more or less summarizes the whole review. When requesting a book, please include your surface address! After receiving the book, you have 2 months to complete the review.

If you have any further questions, please contact Edoardo Persichetti via books at iacr.org.

Below you find books available for review and currently under review.

Available Books

Go to titles from:

Cambridge University Press

Further titles are available via Cambridge University Press' website.

  1. Buchberger: Gröbner Bases and Applications
  2. Buttyán: Security and Cooperation in Wireless Networks
  3. Churchhouse: Codes and Ciphers
  4. Huth: Secure Communicating Systems - Design, Analysis, and Implementation
  5. Kempf: Wireless Internet Security - Architecture and Protocols
  6. Obaidat: Security of e-Systems and Computer Networks
  7. Sinkov: Elementary Cryptanalysis, 2nd Edition
  8. Yanofsky: Quantum Computing for Computer Scientists

CRC Press/Taylor & Francis Group

Further titles are available via CRC Press/Taylor & Francis Group's website.

  1. Acquisti: Digital Privacy: Theory, Technologies, and Practices
  2. Blanchet-Sadri: Algorithmic Combinatorics on Partial Words
  3. Brualdi: A Combinatorial Approach to Matrix Theory and Its Applications
  4. Chin: Access Control, Security, and Trust: A logical Approach
  5. Furht: Multimedia Watermarking Techniques and Applications
  6. Gross: Combinatorial Methods with Computer Applications
  7. Hardy: Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition
  8. Heubach: Combinatorics of Compositions and Words
  9. Hinek: Cryptanalysis of RSA and Its Variants
  10. Johnson: Handbook of Finite Translation Planes
  11. Joshi: A new Paradigm to Information Security
  12. Joux: Algorithmic Cryptanalysis
  13. Koolen: Applications of Group Theory to Combinatorics
  14. Lindner: Design Theory, Second Edition
  15. Liu: Security and Policy Driven Computing
  16. Moldovyan: Data-driven Block Ciphers for Fast Telecommunication Systems
  17. Paulsen: Abstract Algebra. An interactive Approach
  18. Peeva: Syzygies and Hilbert Functions
  19. Roberts: Applied Combinatorics, Second Edition
  20. Smith: Introduction to Abstract Algebra
  21. Szabo: Factoring Groups into Subsets
  22. Thuraisingham: Secure Semantic Service-Oriented Systems
  23. Valiente: Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R
  24. Wallis: Introduction to Combinatorial Designs, Second Edition
  25. Xiao: Security in Distributed, Grid, Mobile, and Pervasive Computing

Presses Polytechnique et Universitaires Romandes

  1. Avoine: Computer System Security - Basic Concepts and Solved Exercises
  2. Sherif: Paiements Electroniques Securises [French]
  3. Tashi: Information Security Evaluation

Springer

Further titles are available via Springer's website.

  1. Adjeroh: The Burrows-Wheeler Transform
  2. Aigner: Das BUCH der Beweise [German]
  3. Applebaum: Cryptography in Constant Parallel Time
  4. Bauer: Origins and Foundations of Computing
  5. Berrou: Codes and Turbo Codes
  6. Böhme: Advanced Statistical Steganalysis
  7. Borda: Fundamentals in Information Theory and Coding
  8. Buchmann: Introduction to Public Key Infrastructures
  9. Cachin: Introduction to Reliable and Secure Distributed Programming - 2nd Edition
  10. Camp: Economics of Identity Theft
  11. Chatterjee: Identity-Based Encryption
  12. Dietzfelbinger: Primality Testing in Polynomial Time
  13. Fine: Number Theory
  14. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  15. Gómez Pardo: Introduction to Cryptography with Maple
  16. Higgins: Number Story
  17. Joye: Fault Analysis in Cryptography
  18. Jukna: Boolean Function Complexity
  19. Keromytis: Voice over IP Security
  20. Kościelny: Modern Cryptography Primer
  21. Kuo: Precoding Techniques for Digital Communication Systems
  22. Markantonakis: Secure Smart Embedded Devices, Platforms and Applications
  23. Maruoka: Concise Guide to Computation Theory
  24. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  25. Riesel: Prime Numbers and Computer Methods for Factorization
  26. Robshaw: New Stream Cipher Designs
  27. Roussos: Networked RFID: Systems, Software and Services
  28. Salomon: A Concise Introduction to Data Compression
  29. Sammes: Forensic Computing
  30. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  31. Schneider: Engineering Secure Two-Party Computation Protocols
  32. Shi: Transactions on Data Hiding and Multimedia Security III
  33. Stolfo: Insider Attack and Cyber Security
  34. Traynor: Security for Telecommunications Networks
  35. Verbauwhede: Secure Integrated Circuits and Systems
  36. Vöcking: Taschenbuch der Algorithmen [German]
  37. Yan: Quantum Attacks on Public-Key Cryptosystems
  38. Yeung: Information Theory and Network Coding
  39. Zeng: Quantum Private Communication

Go up.

Books under review

Cambridge University Press books under review:

  1. [ 2014-01-30 Yesem Kurt Peker] Alpcan: Network Security - A Decision and Game-Theoretic Approach
  2. [!2014-06-01 Eric Diehl] Fridrich: Steganography in Digital Media - Principles, Algorithms, and Applications

CRC Press/Taylor & Francis Group Group books under review:

  1. [ 2014-08-26 Jorge Nakahara] Cao: New Directions of Modern Cryptography
  2. [ 2014-09-26 Frederic Ezerman] Gould: Mathematics in Games, Sports, and Gambling
  3. [ 2014-09-27 S.V. Nagaraj] Rosenberg: Handbook of Financial Cryptography and Security
  4. [ 2014-10-7 Amit K. Awasthi]Mollin: Fundamental Number Theory with Applications, Second Edition
  5. [ 2014-10-14 Bertrand Fan]Elaydi: Discrete Chaos, Second Edition: With Applications in Science and Engineering

Springer books under review:

  1. [ 2013-01-18 Joerg Gerschuetz] Di Pietro: Intrusion Detection Systems
  2. [ 2014-06-23 Vincenzo Iovino] Katz: Digital Signatures
  3. [ 2014-12-31 Jiaxin Pan] Li: An Introduction to Kolmogorov Complexity and Its Applications
  4. [ 2014-06-23 Kian Boon] Crandall: Prime Numbers
  5. [ 2014-06-23 Subhayan RoyMoulick] Goldreich: Modern Cryptography, Probabilistic Proofs and Pseudorandomness
  6. [!2014-12-31 Sashank Dara] Cremers: Operational Semantics and Verification of Security Protocols
  7. [ 2014-08-01 Jothi Rangasamy] Chatterjee: Identity-Based Encryption

Go up.