If you are interested in writing a review or have any other question regarding
the IACR book reviewing system,
please contact **Edoardo Persichetti** (University of Warsaw, Poland) via ** books at iacr.org**.
New book reviews are posted continuously.

If you are interested in reviewing any other books from Cambridge University Press, CRC Press/Taylor & Francis Group, PPUR or Springer, please send me an email. I am pretty sure that I can organize this book. I did not try yet for other publishers, but the process is pretty straight forward, i.e. if you want to review a book from any other publisher, send me an email, too. However, it may take a while.

- What is this book about (summary)?
- What is the book like (style)?
- Would you recommend this book (if yes: for whom?)?
- Would your review be helpful for
*yourself*?

If you have any further questions, please contact **Edoardo Persichetti** via *books at iacr.org*.

Go to titles from:

- Cambridge University Press
- CRC Press/Taylor & Francis Group
- Presses Polytechnique Et Universitaires Romandes
- Springer

Further titles are available via Cambridge University Press' website. Cambridge University Press books available for review:

- Buchberger:
*Gröbner Bases and Applications* - Buttyán:
*Security and Cooperation in Wireless Networks* - Churchhouse:
*Codes and Ciphers* - Golomb:
*Signal Design for Good Correlation* - Huth:
*Secure Communicating Systems - Design, Analysis, and Implementation* - Kempf:
*Wireless Internet Security - Architecture and Protocols* - Obaidat:
*Security of e-Systems and Computer Networks* - Sinkov:
*Elementary Cryptanalysis, 2nd Edition* - van der Lubbe:
*Basic Methods of Cryptography* - Yanofsky:
*Quantum Computing for Computer Scientists*

Further titles are available via CRC Press/Taylor & Francis Group's website. CRC Press/Taylor & Francis Group books available for review:

- Blanchet-Sadri:
*Algorithmic Combinatorics on Partial Words* - Brualdi:
*A Combinatorial Approach to Matrix Theory and Its Applications* - Dua:
*Data Mining and Machine Learning in Cybersecurity* - Gross:
*Combinatorial Methods with Computer Applications* - Johnson:
*Handbook of Finite Translation Planes* - Kraft:
*An Introduction to Number Theory with Cryptography* - Lindner:
*Design Theory, Second Edition* - Liu:
*Security and Policy Driven Computing* - Moldovyan:
*Data-driven Block Ciphers for Fast Telecommunication Systems* - Paulsen:
*Abstract Algebra. An interactive Approach* - Peeva:
*Syzygies and Hilbert Functions* - Szabo:
*Factoring Groups into Subsets* - Thuraisingham:
*Secure Semantic Service-Oriented Systems* - Wallis:
*Introduction to Combinatorial Designs, Second Edition* - Xiao:
*Security in Distributed, Grid, Mobile, and Pervasive Computing*

- Avoine:
*Computer System Security - Basic Concepts and Solved Exercises* - Sherif:
*Paiements Electroniques Securises [French]* - Tashi:
*Information Security Evaluation* - Vaudenay:
*La Fracture Cryptographique [French]*

Further titles are available via Springer's website. Springer books available for review:

- Adjeroh:
*The Burrows-Wheeler Transform* - Aycock:
*Spyware and Adware* - Bard:
*Algebraic Cryptanalysis* - Bauer:
*Origins and Foundations of Computing* - Böhme:
*Advanced Statistical Steganalysis* - Cachin:
*Introduction to Reliable and Secure Distributed Programming - 2nd Edition* - Camp:
*Economics of Identity Theft* - Cremers:
*Operational Semantics and Verification of Security Protocols* - Fine:
*Number Theory* - Gallier:
*Discrete Mathematics* - Gomes:
*Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms* - Hromkovic:
*Theoretical Computer Science* - Keromytis:
*Voice over IP Security* - Kuo:
*Precoding Techniques for Digital Communication Systems* - Li:
*An Introduction to Kolmogorov Complexity and Its Applications* - Maruoka:
*Concise Guide to Computation Theory* - Mehlhorn:
*Algorithms and Data Structures* - Onieva:
*Secure Multi-Party Non-Repudiation Protocols and Applications* - Robshaw:
*New Stream Cipher Designs* - Salomon:
*A Concise Introduction to Data Compression* - Sammes:
*Forensic Computing* - Schellekens:
*A Modular Calculus for the Average Cost of Data Structuring* - Shi:
*Transactions on Data Hiding and Multimedia Security III* - Traynor:
*Security for Telecommunications Networks* - Vöcking:
*Taschenbuch der Algorithmen [German]* - Yeung:
*Information Theory and Network Coding* - Zeng:
*Quantum Private Communication*

**Cambridge University Press** books under review:

- [ 2014-01-30 Yesem Kurt Peker] Alpcan:
*Network Security - A Decision and Game-Theoretic Approach* - [!2014-06-01 Eric Diehl] Fridrich:
*Steganography in Digital Media - Principles, Algorithms, and Applications*

**CRC Press/Taylor & Francis Group Group** books under review:

- [ 2011-03-01 Ulrich Kaiser] Elaydi, Saber N.:
*Discrete Chaos, Second Edition: With Applications in Science and Engineering* - [ 2011-03-07 Alan Buxey] Young, S.:
*The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks* - [ 2011-03-08 Jens Irrgang] Sklavos, N.:
*Wireless Security and Cryptography: Specifications and Implementations* - [!2011-05-01 Ladan Mahabdi] Lian, Shiguo:
*Multimedia Content Encryption: Techniques and Applications* - [!2011-07-01 Jean-Jacques Quisquater] Hsu:
*Graph Theory and Interconnection Networks* - [!2011-07-01 Jean-Jacques Quisquater] Fung:
*Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques* - [ 2011-05-27 Michael Adjedj] Rosenberg:
*Handbook of Financial Cryptography and Security* - [ 2013-06-17 Kilian David] Gould:
*Mathematics in Games, Sports, and Gambling* - [ 2013-09-16 Frederic Ezerman] Stanoyevitch:
*Discrete Structures with Contemporary Applications* - [!2014-06-11 Jorge Nakahara] Mullen:
*Handbook of Finite Fields*

**Springer** books under review:

- [
**Ulrich Dürholz**is working on the review since 2010-03-17 and he is not replying to my emails since 2010-03-17]

Micheloni:*Error Correction Codes for Non-Volatile Memories* - [
**Till Stegers**is working on the review since 2010-10-25 and he is not replying to my emails since 2010-10-25]

Koblitz:*Random Curves* - [not yet published Safuat Hamdy] Desmedt:
*Secure Public Key Infrastructure* - [ 2011-02-28 Marc Joye] Katz:
*Digital Signatures* - [!2011-06-30 Azzedine Ramrani] Rodríguez-Henríquez:
*Cryptographic Algorithms on Reconfigurable Hardware* - [!2011-07-01 Jean-Jacques Quisquater] Schroeder:
*Number Theory in Science and Communication* - [!2011-07-01 Jean-Jacques Quisquater] Chaum:
*Towards Trustworthy Elections* - [ 2011-08-15 Alfonso de Gregorio] Portnoy:
*Global Initiatives to Secure Cyberspace* - [ 2013-01-18 Joerg Gerschuetz] Di Pietro:
*Intrusion Detection Systems* - [ 2013-06-14 Sashank Dara] Dowek:
*Proofs and Algorithms - An Introduction to Logic and Computability* - [ 2013-09-16 S.V. Nagaraj] Buchmann:
*Binary Quadratic Forms* - [ 2014-02-11 Edoardo Persichetti] Bernstein:
*Post-Quantum Cryptography*

**Cambridge University Press** books with a completed review:

- [done Avradip Mandal] Blake:
*Elliptic Curves in Cryptography* - [done Serdar Boztas] Csiszár:
*Information Theory - Coding Theorems for Discrete Memoryless Systems, 2nd Edition* - [done Frederic Ezermann] Desurvire:
*Classical and Quantum Information Theory - An Introduction for the Telecom Scientist* - [done Edoardo Persichetti] Goldreich:
*Foundations of Cryptography Volumes I and II* - [done Yesem Kurt Peker] Hendry:
*Multi-application Smart Cards - Technology and Applications* - [done Edoardo Persichetti] Lidl:
*Finite Fields - 2nd Edition* - [done Bertrand Junjie Fan] Loepp:
*Protecting Information - From Classical Error Correction to Quantum Cryptography* - [done Constantinos Patsakis] Loxton:
*Number Theory and Cryptography* - [done Edoardo Persichetti] McEliece:
*The Theory of Information and Coding, 2nd Edition* - [done Gregory Kohring] Mermin:
*Quantum Computer Science - An Introduction* - [done Cristina Onete] Nielsen:
*Quantum Computation and Quantum Information, 10th Anniversary Edition* - [done Sashank Dara] Talbot:
*Complexity and Cryptography - An Introduction*

**CRC Press/Taylor & Francis Group Group** books with a completed review:

- [done Dominik Birk] Ahson:
*Cloud Computing and Software Services: Theory and Techniques* - [done Eric Diehl] Avoine, Gildas:
*Computer System Security: Basic Concepts and Solved Exercises* - [done Jannik Pewny] Bella:
*Formal Correctness of Security Protocols* - [done Eric Diehl] Bonchi:
*Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques* - [done S.V. Nagaraj] Boudriga, N.:
*Security of Mobile Communications* - [done S.V. Nagaraj] Buchanan:
*Introduction to Security and Network Forensics* - [done Yong Hao Ng] Chartrand:
*Chromatic Graph Theory* - [done Thierry Moreau] Cohen, H.:
*Handbook of Elliptic and Hyperelliptic Curve Cryptography* - [done Olivier Blazy] Elbirt, Adam J.:
*Understanding and Applying Cryptography and Data Security* - [done Edoardo Persichetti] Erickson, Martin:
*Introduction to Number Theory* - [done Yesem Kurt Peker] Furht, B.:
*Multimedia Watermarking Techniques and Applications* - [done Gregory Kohring] Garnier:
*Discrete Mathematics* - [done Emin Tatli] Graham:
*Cyber Security Essentials* - [done Julia Borghoff] Hardy, Darel W.:
*Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition* - [done Serdar Boztas] Heubach, Silvia:
*Combinatorics of Compositions and Words* - [done Jannik Pewny] Hinek, M. Jason:
*Cryptanalysis of RSA and Its Variants* - [done S.V. Nagaraj] Hu:
*Wireless Sensor Networks: Principles and Practice* - [done Olivier Blazy] Jacobson, Douglas:
*Introduction to Network Security* - [done Julia Borghoff] Joux, Antoine:
*Algorithmic Cryptanalysis* - [done Cristina Onete] Katz, Jonathan:
*Introduction to Modern Cryptography: Principles and Protocols* - [done Ladan Mahabadi] Katz, Jonathan:
*Introduction to Modern Cryptography: Principles and Protocols* - [done Cristina Onete] Kitsos, P.:
*Security in RFID and Sensor Networks* - [done Asha Rao] Koolen, Jack:
*Applications of Group Theory to Combinatorics* - [done Yesem Kurt Peker] Landoll:
*The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition* - [done Jannik Pewny] Lian, Shiguo:
*Multimedia Content Encryption: Techniques and Applications* - [done Kian Boon Tay] Loehr:
*Bijective Combinatorics* - [done Jorge Nakahara Jr.] Lozano-Nieto:
*RFID Design Fundamentals and Applications* - [done Abderrahmane Nitaj] McAndrew:
*Introduction to Cryptography with Open-Source Software* - [done Emin Tatli] Merkow:
*Secure and Resilient Software Development* - [done Bertrand Junjie Fan] Mollin, Richard A.:
*Algebraic Number Theory, Second edition* - [done Francesco Sica] Mollin, Richard A.:
*Fundamental Number Theory with Applications, Second Edition* - [done Bertrand Junjie Fan] Mollin, Richard A.:
*Advanced Number Theory with Applications* - [done Ken Radke] Mollin, Richard A.:
*Codes: The Guide to Secrecy From Ancient to Modern Times* - [done Jannik Pewny] Newman, Robert C.:
*Computer Forensics: Evidence Collection and Management* - [done S.V. Nagaraj] Pathan:
*Security of Self-Organizing Networks: MANET, WSN, WMN, VANET* - [done Kian Boon Tay] Roberts, Fred:
*Applied Combinatorics, Second Edition* - [done Kian Boon Tay] Rosen:
*Handbook of Discrete and Combinatorial Mathematics, Second Edition* - [done Frederic A.B. Edoukou] Smith, Jonathan D. H.:
*Introduction to Abstract Algebra* - [done S.V. Nagaraj] Stanoyevitch, A.:
*Introduction to Cryptography with Mathematical Foundations and Computer Implementations* - [done Emin Tatli] Talukder, Asoke K.:
*Architecting Secure Software Systems* - [done Jannik Pewny] Valiente, Gabriel:
*Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R* - [done Vincent Immler] Washington, Lawrence C.:
*Elliptic Curves: Number Theory and Cryptography, Second Edition* - [done Gloria Tuquerres] Zhang, Y.:
*Security in Wireless Mesh Networks*

**Presses Polytechnique Et Universitaires Romandes** books with a completed review:

- [done Eric Diehl] Martin:
*Codage, Cryptologie et Applications [French]*

**Springer books** with a completed review:

- [done Edoardo Persichetti] Hoffstein:
*An Introduction to Mathematical Cryptography* - [done Gregory Kohring] Aigner:
*Proofs from THE BOOK* -
[done Gregory Kohring] Aigner:
*Das BUCH der Beweise [German]* -
[done Abdelhak Azhari] Baigneres:
*A Classical Introduction to Cryptography Exercise Book* -
[done Yesem Kurt Peker] Baldoni:
*Elementary Number Theory, Cryptography and Codes* -
[done Wael Said Abdel mageed Mohamed] Bard:
*Algebraic Cryptanalysis* -
[done Rusydi Hasan Makarim] Bard:
*Algebraic Cryptanalysis* -
[done Denise Reinert] Bauer:
*Decrypted Secrets* - [done Denise Reinert] Bauer:
*Entzifferte Geheimnisse [German]* -
[done Jannik Pewny] Bauer:
*Historische Notizen zur Informatik [German]* - [done Frederic Ezerman] Biggs:
*Codes: An Introduction to Information Communication and Cryptography* - [done S.V. Nagaraj] Biskup:
*Security in Computing Systems* - [done Mohamed Saied Emam Mohamed] Buchmann:
*Introduction to Cryptography* - [done Kilian David] Boyd:
*Protocols for Authentication and Key Establishment* - [done Olivier Blazy] Calmet:
*Mathematical Methods in Computer Science* -
[done Olivier Blazy] Chen:
*Terrorism Informatics* -
[done Lakshmi Kuppusamy] Choo:
*Secure Key Establishment* -
[done Stanislav Bulygin] Cid:
*Algebraic Aspects of the Advanced Encryption Standard* -
[done Cristina Onete] Cole:
*Networked RFID Systems and Lightweight Cryptography* -
[done Meiko Jensen] Damiani:
*Open Source Systems Security Certification* -
[done Seyyd Hasan Mirjalili] Delfs:
*Introduction to Cryptography* - [done Amit Awasthi] Dent:
*Practical Signcryption* - [done Abderrahmane Nitaj] Dietzfelbinger:
*Primality Testing in Polynomial Time* - [done Albrecht Petzold] Ding:
*Multivariate Public Key Cryptosystems* - [done Jothi Rangasamy] Foresti:
*Preserving Privacy in Data Outsourcing* - [done Mark Daniel] Ghorbani:
*Network Intrusion Detection and Prevention* -
[done Luigi Lo Iacono] Hafner:
*Security Engineering for Service-Oriented Architectures* - [done Cristina Onete] Hazay:
*Efficient Secure Two-Party Protocols* -
[done Cristina Onete] Henrici:
*RFID Security and Privacy* -
[done Paolo Palmieri] Higgins:
*Number Story* - [done Mark Daniel] Hromkovic:
*Algorithmic Adventures* -
[done Kilian David] Kizza:
*Guide to Computer Network Security* -
[done Azzeddine Ramrami] Koç:
*Cryptographic Engineering* - [done S.V. Nagaraj] Kocarev:
*Chaos-based Cryptography - Theory, Algorithms and Applications* - [done Kian Boon Tay] Larson:
*Problem-Solving Through Problems* - [done Joerg Gerschuetz] Lee:
*Botnet Detection* -
[done Andrew Waterhouse] Lemke:
*Embedded Security in Cars* - [done Gregory Kohring] Lipton:
*The P=NP Question and Gödel’s Lost Letter* - [done Arnaud Tisserand] Mangard:
*Power Analysis Attacks* -
[done Eric Diehl] Mayes:
*Smart Cards, Tokens, Security and Applications* - [done Steven Galbraith] Nguyen:
*The LLL Algorithm* -
[done Luigi Lo Iacono] Nielsen:
*A Concise and Practical Introduction to Programming Algorithms in Java* -
[done Luigi Lo Iacono] Paar:
*Understanding Cryptography - A Textbook for Students and Practioners* -
[done Rolf Oppliger] Rothe:
*Komplexitätstheorie und Kryptologie [German]* -
[done Eric Diehl] Rousseau:
*Mathematics and Technology* - [done S.V. Nagaraj] Sadeghi:
*Towards Hardware-Intrinsic Security* -
[done Stas Bulygin] Sala:
*Gröbner Bases, Coding, and Cryptography* - [done Yesem Kurt Peker] Salomon:
*Elements of Computer Security* - [done Erik Tews]
Schneier:
*Beyond Fear* -
[done Jannik Pewny] Singh:
*Identifying Malicious Code Through Reverse Engineering* - [done Luigi Lo Iacono and Kilian David] Stavroulakis:
*Handbook of Information and Communication Security* - [done Steven Galbraith] Stichtenoth:
*Algebraic Function Fields and Codes* -
[done Choudary Gorantla] Sun:
*Network-Aware Security for Group Communications* - [done Nadia El Mrabet] Tuyls:
*Security with Noisy Data* - [done Jothi Rangasamy] Vaudenay:
*A Classical Introduction to Cryptography* -
[done Mario Strefler] Wang:
*Computer Network Security* -
[done Joerg Gerschuetz] Yan:
*Primality Testing and Integer Factorization in Public-Key Cryptography* -
[done Yuriy Aydarov] Yan:
*Cryptanalytic Attacks on RSA*

**Wiley and Sons** books with a completed review:

- [done Safuat Hamdy] Anderson:
*Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition*