International Association for Cryptologic Research
IACR logo

List of Books for Review

If you are interested in writing a review or have any other question regarding the IACR book reviewing system, please contact Edoardo Persichetti (University of Warsaw, Poland) via books at iacr.org. New book reviews are posted continuously.

If you are interested in reviewing any other books from Cambridge University Press, CRC Press/Taylor & Francis Group, PPUR or Springer, please send me an email. I am pretty sure that I can organize this book. I did not try yet for other publishers, but the process is pretty straight forward, i.e. if you want to review a book from any other publisher, send me an email, too. However, it may take a while.

Reviewing Guidelines

So, what should a review look like? Keep in mind that your review should be helpful for the reader. So summarize its content and then give examples for very good and very bad parts. Give an overall conclusion (e.g. this book could be particular helpful for the following group, is over the top / too easy for...). If your review is longer than the book or shorter than the text on its back, something went wrong, thus we recommend to keep it between 2-5 pages. Apart from that, there are no guidelines. Just start reviewing and assume you would be reading your review. Would you like it? So the key questions are:
  • What is this book about (summary)?
  • What is the book like (style)?
  • Would you recommend this book (if yes: for whom?)?
  • Would your review be helpful for yourself?
Prefered format is PDF, see previous reviews or our LaTeX-Template. In addition, I need a 3-10 line "teaser" which more or less summarizes the whole review. In addition, you can also look at other reviews to get an idea what to cover. When requesting a book, please do also include your surface address! After receiving the book, you have 2 month to complete the review.

If you have any further questions, please contact Edoardo Persichetti via books at iacr.org.

Below you find books available for review, currently under review and with a completed review

Available Books

Go to titles from:

Cambridge University Press

Further titles are available via Cambridge University Press' website. Cambridge University Press books available for review:

  1. Buchberger: Gröbner Bases and Applications
  2. Buttyán: Security and Cooperation in Wireless Networks
  3. Churchhouse: Codes and Ciphers
  4. Golomb: Signal Design for Good Correlation
  5. Huth: Secure Communicating Systems - Design, Analysis, and Implementation
  6. Kempf: Wireless Internet Security - Architecture and Protocols
  7. Obaidat: Security of e-Systems and Computer Networks
  8. Sinkov: Elementary Cryptanalysis, 2nd Edition
  9. van der Lubbe: Basic Methods of Cryptography
  10. Yanofsky: Quantum Computing for Computer Scientists

CRC Press/Taylor & Francis Group

Further titles are available via CRC Press/Taylor & Francis Group's website. CRC Press/Taylor & Francis Group books available for review:

  1. Blanchet-Sadri: Algorithmic Combinatorics on Partial Words
  2. Brualdi: A Combinatorial Approach to Matrix Theory and Its Applications
  3. Dua: Data Mining and Machine Learning in Cybersecurity
  4. Gross: Combinatorial Methods with Computer Applications
  5. Johnson: Handbook of Finite Translation Planes
  6. Kraft: An Introduction to Number Theory with Cryptography
  7. Lindner: Design Theory, Second Edition
  8. Liu: Security and Policy Driven Computing
  9. Moldovyan: Data-driven Block Ciphers for Fast Telecommunication Systems
  10. Paulsen: Abstract Algebra. An interactive Approach
  11. Peeva: Syzygies and Hilbert Functions
  12. Szabo: Factoring Groups into Subsets
  13. Thuraisingham: Secure Semantic Service-Oriented Systems
  14. Wallis: Introduction to Combinatorial Designs, Second Edition
  15. Xiao: Security in Distributed, Grid, Mobile, and Pervasive Computing

Presses Polytechnique Et Universitaires Romandes

PPUR books available for review:
  1. Avoine: Computer System Security - Basic Concepts and Solved Exercises
  2. Sherif: Paiements Electroniques Securises [French]
  3. Tashi: Information Security Evaluation
  4. Vaudenay: La Fracture Cryptographique [French]

Springer

Further titles are available via Springer's website. Springer books available for review:

  1. Adjeroh: The Burrows-Wheeler Transform
  2. Aycock: Spyware and Adware
  3. Bard: Algebraic Cryptanalysis
  4. Bauer: Origins and Foundations of Computing
  5. Böhme: Advanced Statistical Steganalysis
  6. Cachin: Introduction to Reliable and Secure Distributed Programming - 2nd Edition
  7. Camp: Economics of Identity Theft
  8. Chatterjee: Identity-Based Encryption
  9. Cremers: Operational Semantics and Verification of Security Protocols
  10. Fine: Number Theory
  11. Gallier: Discrete Mathematics
  12. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms
  13. Hromkovic: Theoretical Computer Science
  14. Keromytis: Voice over IP Security
  15. Kuo: Precoding Techniques for Digital Communication Systems
  16. Li: An Introduction to Kolmogorov Complexity and Its Applications
  17. Maruoka: Concise Guide to Computation Theory
  18. Mehlhorn: Algorithms and Data Structures
  19. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications
  20. Robshaw: New Stream Cipher Designs
  21. Salomon: A Concise Introduction to Data Compression
  22. Sammes: Forensic Computing
  23. Schellekens: A Modular Calculus for the Average Cost of Data Structuring
  24. Shi: Transactions on Data Hiding and Multimedia Security III
  25. Traynor: Security for Telecommunications Networks
  26. Vöcking: Taschenbuch der Algorithmen [German]
  27. Yeung: Information Theory and Network Coding
  28. Zeng: Quantum Private Communication

Go up.

Books under review

Cambridge University Press books under review:

  1. [ 2014-01-30 Yesem Kurt Peker] Alpcan: Network Security - A Decision and Game-Theoretic Approach
  2. [!2014-06-01 Eric Diehl] Fridrich: Steganography in Digital Media - Principles, Algorithms, and Applications

CRC Press/Taylor & Francis Group Group books under review:

  1. [ 2011-03-01 Ulrich Kaiser] Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering
  2. [ 2011-03-07 Alan Buxey] Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
  3. [ 2011-03-08 Jens Irrgang] Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations
  4. [!2011-05-01 Ladan Mahabdi] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  5. [!2011-07-01 Jean-Jacques Quisquater] Hsu: Graph Theory and Interconnection Networks
  6. [!2011-07-01 Jean-Jacques Quisquater] Fung: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques
  7. [ 2011-05-27 Michael Adjedj] Rosenberg: Handbook of Financial Cryptography and Security
  8. [ 2013-06-17 Kilian David] Gould: Mathematics in Games, Sports, and Gambling
  9. [ 2013-09-16 Frederic Ezerman] Stanoyevitch: Discrete Structures with Contemporary Applications
  10. [!2014-06-11 Jorge Nakahara] Mullen: Handbook of Finite Fields

Springer books under review:

  1. [Ulrich Dürholz is working on the review since 2010-03-17 and he is not replying to my emails since 2010-03-17]
    Micheloni: Error Correction Codes for Non-Volatile Memories

  2. [Till Stegers is working on the review since 2010-10-25 and he is not replying to my emails since 2010-10-25]
    Koblitz: Random Curves

  3. [not yet published Safuat Hamdy] Desmedt: Secure Public Key Infrastructure
  4. [ 2011-02-28 Marc Joye] Katz: Digital Signatures
  5. [!2011-06-30 Azzedine Ramrani] Rodríguez-Henríquez: Cryptographic Algorithms on Reconfigurable Hardware
  6. [!2011-07-01 Jean-Jacques Quisquater] Schroeder: Number Theory in Science and Communication
  7. [!2011-07-01 Jean-Jacques Quisquater] Chaum: Towards Trustworthy Elections
  8. [ 2011-08-15 Alfonso de Gregorio] Portnoy: Global Initiatives to Secure Cyberspace
  9. [ 2013-01-18 Joerg Gerschuetz] Di Pietro: Intrusion Detection Systems
  10. [ 2013-06-14 Sashank Dara] Dowek: Proofs and Algorithms - An Introduction to Logic and Computability
  11. [ 2013-09-16 S.V. Nagaraj] Buchmann: Binary Quadratic Forms
  12. [ 2014-02-11 Edoardo Persichetti] Bernstein: Post-Quantum Cryptography

Go up.

Books with a completed review

Cambridge University Press books with a completed review:

  1. [done Avradip Mandal] Blake: Elliptic Curves in Cryptography
  2. [done Serdar Boztas] Csiszár: Information Theory - Coding Theorems for Discrete Memoryless Systems, 2nd Edition
  3. [done Frederic Ezermann] Desurvire: Classical and Quantum Information Theory - An Introduction for the Telecom Scientist
  4. [done Edoardo Persichetti] Goldreich: Foundations of Cryptography Volumes I and II
  5. [done Yesem Kurt Peker] Hendry: Multi-application Smart Cards - Technology and Applications
  6. [done Edoardo Persichetti] Lidl: Finite Fields - 2nd Edition
  7. [done Bertrand Junjie Fan] Loepp: Protecting Information - From Classical Error Correction to Quantum Cryptography
  8. [done Constantinos Patsakis] Loxton: Number Theory and Cryptography
  9. [done Edoardo Persichetti] McEliece: The Theory of Information and Coding, 2nd Edition
  10. [done Gregory Kohring] Mermin: Quantum Computer Science - An Introduction
  11. [done Cristina Onete] Nielsen: Quantum Computation and Quantum Information, 10th Anniversary Edition
  12. [done Sashank Dara] Talbot: Complexity and Cryptography - An Introduction

CRC Press/Taylor & Francis Group Group books with a completed review:

  1. [done Dominik Birk] Ahson: Cloud Computing and Software Services: Theory and Techniques
  2. [done Eric Diehl] Avoine, Gildas: Computer System Security: Basic Concepts and Solved Exercises
  3. [done Jannik Pewny] Bella: Formal Correctness of Security Protocols
  4. [done Eric Diehl] Bonchi: Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques
  5. [done S.V. Nagaraj] Boudriga, N.: Security of Mobile Communications
  6. [done S.V. Nagaraj] Buchanan: Introduction to Security and Network Forensics
  7. [done Yong Hao Ng] Chartrand: Chromatic Graph Theory
  8. [done Thierry Moreau] Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography
  9. [done Olivier Blazy] Elbirt, Adam J.: Understanding and Applying Cryptography and Data Security
  10. [done Edoardo Persichetti] Erickson, Martin: Introduction to Number Theory
  11. [done Yesem Kurt Peker] Furht, B.: Multimedia Watermarking Techniques and Applications
  12. [done Gregory Kohring] Garnier: Discrete Mathematics
  13. [done Emin Tatli] Graham: Cyber Security Essentials
  14. [done Julia Borghoff] Hardy, Darel W.: Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition
  15. [done Serdar Boztas] Heubach, Silvia: Combinatorics of Compositions and Words
  16. [done Jannik Pewny] Hinek, M. Jason: Cryptanalysis of RSA and Its Variants
  17. [done S.V. Nagaraj] Hu: Wireless Sensor Networks: Principles and Practice
  18. [done Olivier Blazy] Jacobson, Douglas: Introduction to Network Security
  19. [done Julia Borghoff] Joux, Antoine: Algorithmic Cryptanalysis
  20. [done Cristina Onete] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols
  21. [done Ladan Mahabadi] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols
  22. [done Cristina Onete] Kitsos, P.: Security in RFID and Sensor Networks
  23. [done Asha Rao] Koolen, Jack: Applications of Group Theory to Combinatorics
  24. [done Yesem Kurt Peker] Landoll: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
  25. [done Jannik Pewny] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications
  26. [done Kian Boon Tay] Loehr: Bijective Combinatorics
  27. [done Jorge Nakahara Jr.] Lozano-Nieto: RFID Design Fundamentals and Applications
  28. [done Abderrahmane Nitaj] McAndrew: Introduction to Cryptography with Open-Source Software
  29. [done Emin Tatli] Merkow: Secure and Resilient Software Development
  30. [done Bertrand Junjie Fan] Mollin, Richard A.: Algebraic Number Theory, Second edition
  31. [done Francesco Sica] Mollin, Richard A.: Fundamental Number Theory with Applications, Second Edition
  32. [done Bertrand Junjie Fan] Mollin, Richard A.: Advanced Number Theory with Applications
  33. [done Ken Radke] Mollin, Richard A.: Codes: The Guide to Secrecy From Ancient to Modern Times
  34. [done Jannik Pewny] Newman, Robert C.: Computer Forensics: Evidence Collection and Management
  35. [done S.V. Nagaraj] Pathan: Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
  36. [done Kian Boon Tay] Roberts, Fred: Applied Combinatorics, Second Edition
  37. [done Kian Boon Tay] Rosen: Handbook of Discrete and Combinatorial Mathematics, Second Edition
  38. [done Frederic A.B. Edoukou] Smith, Jonathan D. H.: Introduction to Abstract Algebra
  39. [done S.V. Nagaraj] Stanoyevitch, A.: Introduction to Cryptography with Mathematical Foundations and Computer Implementations
  40. [done Emin Tatli] Talukder, Asoke K.: Architecting Secure Software Systems
  41. [done Jannik Pewny] Valiente, Gabriel: Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R
  42. [done Vincent Immler] Washington, Lawrence C.: Elliptic Curves: Number Theory and Cryptography, Second Edition
  43. [done Gloria Tuquerres] Zhang, Y.: Security in Wireless Mesh Networks

Presses Polytechnique Et Universitaires Romandes books with a completed review:

  1. [done Eric Diehl] Martin: Codage, Cryptologie et Applications [French]

Springer books with a completed review:

  1. [done Edoardo Persichetti] Hoffstein: An Introduction to Mathematical Cryptography
  2. [done Gregory Kohring] Aigner: Proofs from THE BOOK
  3. [done Gregory Kohring] Aigner: Das BUCH der Beweise [German]
  4. [done Abdelhak Azhari] Baigneres: A Classical Introduction to Cryptography Exercise Book
  5. [done Yesem Kurt Peker] Baldoni: Elementary Number Theory, Cryptography and Codes
  6. [done Wael Said Abdel mageed Mohamed] Bard: Algebraic Cryptanalysis
  7. [done Rusydi Hasan Makarim] Bard: Algebraic Cryptanalysis
  8. [done Denise Reinert] Bauer: Decrypted Secrets
  9. [done Denise Reinert] Bauer: Entzifferte Geheimnisse [German]
  10. [done Jannik Pewny] Bauer: Historische Notizen zur Informatik [German]
  11. [done Frederic Ezerman] Biggs: Codes: An Introduction to Information Communication and Cryptography
  12. [done S.V. Nagaraj] Biskup: Security in Computing Systems
  13. [done Mohamed Saied Emam Mohamed] Buchmann: Introduction to Cryptography
  14. [done Kilian David] Boyd: Protocols for Authentication and Key Establishment
  15. [done Olivier Blazy] Calmet: Mathematical Methods in Computer Science
  16. [done Olivier Blazy] Chen: Terrorism Informatics
  17. [done Lakshmi Kuppusamy] Choo: Secure Key Establishment
  18. [done Stanislav Bulygin] Cid: Algebraic Aspects of the Advanced Encryption Standard
  19. [done Cristina Onete] Cole: Networked RFID Systems and Lightweight Cryptography
  20. [done Meiko Jensen] Damiani: Open Source Systems Security Certification
  21. [done Seyyd Hasan Mirjalili] Delfs: Introduction to Cryptography
  22. [done Amit Awasthi] Dent: Practical Signcryption
  23. [done Abderrahmane Nitaj] Dietzfelbinger: Primality Testing in Polynomial Time
  24. [done Albrecht Petzold] Ding: Multivariate Public Key Cryptosystems
  25. [done Jothi Rangasamy] Foresti: Preserving Privacy in Data Outsourcing
  26. [done Mark Daniel] Ghorbani: Network Intrusion Detection and Prevention
  27. [done Luigi Lo Iacono] Hafner: Security Engineering for Service-Oriented Architectures
  28. [done Cristina Onete] Hazay: Efficient Secure Two-Party Protocols
  29. [done Cristina Onete] Henrici: RFID Security and Privacy
  30. [done Paolo Palmieri] Higgins: Number Story
  31. [done Mark Daniel] Hromkovic: Algorithmic Adventures
  32. [done Kilian David] Kizza: Guide to Computer Network Security
  33. [done Azzeddine Ramrami] Koç: Cryptographic Engineering
  34. [done S.V. Nagaraj] Kocarev: Chaos-based Cryptography - Theory, Algorithms and Applications
  35. [done Kian Boon Tay] Larson: Problem-Solving Through Problems
  36. [done Joerg Gerschuetz] Lee: Botnet Detection
  37. [done Andrew Waterhouse] Lemke: Embedded Security in Cars
  38. [done Gregory Kohring] Lipton: The P=NP Question and Gödel’s Lost Letter
  39. [done Arnaud Tisserand] Mangard: Power Analysis Attacks
  40. [done Eric Diehl] Mayes: Smart Cards, Tokens, Security and Applications
  41. [done Steven Galbraith] Nguyen: The LLL Algorithm
  42. [done Luigi Lo Iacono] Nielsen: A Concise and Practical Introduction to Programming Algorithms in Java
  43. [done Luigi Lo Iacono] Paar: Understanding Cryptography - A Textbook for Students and Practioners
  44. [done Rolf Oppliger] Rothe: Komplexitätstheorie und Kryptologie [German]
  45. [done Eric Diehl] Rousseau: Mathematics and Technology
  46. [done S.V. Nagaraj] Sadeghi: Towards Hardware-Intrinsic Security
  47. [done Stas Bulygin] Sala: Gröbner Bases, Coding, and Cryptography
  48. [done Yesem Kurt Peker] Salomon: Elements of Computer Security
  49. [done Erik Tews] Schneier: Beyond Fear
  50. [done Jannik Pewny] Singh: Identifying Malicious Code Through Reverse Engineering
  51. [done Luigi Lo Iacono and Kilian David] Stavroulakis: Handbook of Information and Communication Security
  52. [done Steven Galbraith] Stichtenoth: Algebraic Function Fields and Codes
  53. [done Choudary Gorantla] Sun: Network-Aware Security for Group Communications
  54. [done Nadia El Mrabet] Tuyls: Security with Noisy Data
  55. [done Jothi Rangasamy] Vaudenay: A Classical Introduction to Cryptography
  56. [done Mario Strefler] Wang: Computer Network Security
  57. [done Joerg Gerschuetz] Yan: Primality Testing and Integer Factorization in Public-Key Cryptography
  58. [done Yuriy Aydarov] Yan: Cryptanalytic Attacks on RSA

Wiley and Sons books with a completed review:

  1. [done Safuat Hamdy] Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition
Further titles are available via Wiley and Sons' website.

Go up.