International Association for Cryptologic Research
IACR logo

Book Reviews

The following reviews shall help the IACR members and the community to buy books in cryptology and related areas.

If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Edoardo Persichetti (Dakota State University, USA) via books at You can check the list of reviewable books to see if your favourite book is still available. At the moment, this list contains books of Cambridge University Press, CRC Press/Taylor & Francis, Elsevier, Presses Polytechnique Et Universitaires Romandes, Springer and Wiley, whose support we hereby gratefully acknowledge.

The reviews are organized by publishing house. If you search for a specific topic or author, you can use <CTRL>+F (or likewise) in your browser.

Cambridge University Press

  1. I. Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography

  2. I. Csiszar, J. Koerner: Information Theory: Coding Theorems for Discrete Memoryless Systems

  3. E. Desurvire: Classical and Quantum Information Theory

  4. O. Goldreich: Foundations of Cryptography, Volumes I and II

  5. S. W. Golomb, G. Gong: Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar

  6. M. Hendry: Multi-application Smart Cards Technology and Applications

  7. R. Lidl, H. Niederreiter: Finite Fields (2nd Edition)

  8. S. Loepp, W. Wootters: Protecting Information: From Classical Error Correction to Quantum Cryptography

  9. J. H. Loxton: Number Theory and Cryptography

  10. R. J. McEliece: The Theory of Information and Coding (2nd Edition)

  11. N. D. Mermin: Quantum Computer Science

  12. M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information

  13. J. Talbot, D. Welsh: Complexity and Cryptography: An Introduction

  14. J. C. A. Van Der Lubbe: Basic Methods of Cryptography

CRC Press/Taylor & Francis Group

  1. S. A. Ahson, M. Ilyas: Cloud Computing and Software Services - Theory and Techniques

  2. F. Bonchi, E. Ferrari (Editors): Privacy-Aware Knowledge Discovery

  3. N. Boudriga: Security of Mobile Communications

  4. W. J. Buchanan: Introduction to Security and Network Forensics

  5. G. Chartrand, P. Zhang: Chromatic Graph Theory

  6. H. Cohen, G. Frey: Handbook of Elliptic and Hyperelliptic Curve Cryptography

  7. A. Das: Computational Number Theory

  8. A. J. Elbirt: Understanding and Applying Cryptography and Data Security

  9. M. Erickson, A. Vazzana: Introduction to Number Theory

  10. B. Furht, D. Kirovski: Multimedia Watermarking Techniques and Applications

  11. R. Garnier, G. Taylor: Discrete Mathematics

  12. J. Graham, R. Howard, R. Olson: Cyber Security Essentials

  13. D. W. Hardy, F. Richman, C. L. Walker: Applied Algebra - Codes, Ciphers, And Discrete Algorithms

  14. S. Heubach, T. Mansour: Combinatorics of Compositions and Words

  15. M. J. Hinek: Cryptanalysis of RSA and its Variants

  16. F. Hu, X. Cao: Wireless Sensor Networks: Principles and Practice

  17. D. Jacobson: Introduction to Network Security

  18. A. Joux: Algorithmic Cryptanalysis

  19. J. Katz, Y. Lindell: Introduction to Modern Cryptography

  20. J. Koolen, J. Ho Kwak, M.-Y. Xu (Editors): Applications of Group Theory to Combinatorics

  21. J. S. Kraft, L. C. Washington: An Introduction to Number Theory with Cryptography

  22. D. J. Landoll: The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments

  23. S. Lian: Multimedia Content Encryption: Techniques and Applications

  24. N. A. Loehr: Bijective Combinatorics

  25. A. Lozano-Nieto: RFID Design Fundamentals and Applications

  26. A. McAndrew: Introduction to Cryptography with Open-Source Software

  27. M. S. Merkow, L. Raghavan: Secure and Resilient Software Development

  28. R. A. Mollin: Advanced Number Theory with Applications

  29. R. A. Mollin: Algebraic Number Theory (2nd Edition)

  30. R. A. Mollin: Codes: The Guide to Secrecy from Ancient to Modern Times

  31. R. A. Mollin: Fundamental Number Theory with Applications (2nd Edition)

  32. G. L. Mullen, D. Panario: Handbook of Finite Fields

  33. R. C. Newman: Computer Forensics - Evidence Collection and Management

  34. A. S. K. Pathan: Security of Self-Organizing Networks

  35. F. Roberts, B. Tesman: Applied Combinatorics (2nd Edition)

  36. K. Rosen: Handbook of Discrete & Combinatorial Mathematics (2nd Edition)

  37. J. Smith: Introduction to Abstract Algebra

  38. A. Stanoyevitch: Discrete Structures with Contemporary Applications

  39. A. Stanoyevitch: Introduction to Cryptography

  40. A. K. Talukder, M. Chaitanya: Architecting Secure Software Systems

  41. G. Valiente: Combinatorial Pattern Matching Algorithms in Computational Biology using Perl and R

  42. L. C. Washington: Elliptic Curves - Number Theory and Cryptography (2nd Edition)

  43. Y. Zhang, P. Kitsos: Security in RFID and Sensor Networks

  44. Y. Zhang, J. Zheng, H. Hu: Security in Wireless Mesh Networks


  1. K. de Leeuw, J. Bergstra (Editors): The History of Information Security - A Comprehensive Handbook

Presses Polytechnique Et Universitaires Romandes

  1. G. Avoine, P. Oechslin, P. Junod: Computer System Security: Basic Concepts and Solved Exercises

  2. B. Martin: Codage, Cryptologie et Applications [French]

  3. S. Vaudenay: La Fracture Cryptographique [French]


  1. M. Aigner, G. M. Ziegler: Proofs from THE BOOK (4th Edition)

  2. T. Baignères, P. Junod, Y. Lu, J. Monnerat, S. Vaudenay: A Classical Introduction To Cryptography Exercise Book

  3. M.W. Baldoni, C. Ciliberto, G.M. Piacentini Cattaneo: Elementary Number Theory, Cryptography and Codes

  4. G. V. Bard: Algebraic Cryptanalysis

  5. F. L. Bauer: Historische Notizen zur Informatik [German]

  6. F. L. Bauer: Decrypted Secrets - Methods and Maxims of Cryptology

  7. F. L. Bauer: Entzifferte Geheimnisse - Methoden und Maximen der Kryptologie [German]

  8. G. Bella: Formal Correctness of Security Protocols

  9. D. J. Bernstein, J. Buchmann, E. Dahmen (Editors): Post-Quantum Cryptography

  10. N. L. Biggs: Codes: An Introduction to Information, Communication and Cryptography

  11. J. Biskup: Security in Computing Systems

  12. C. Boyd, A. Mathuria: Protocols for Authentication and Key Establishment

  13. J. Buchmann: Introduction to Cryptography

  14. J. Buchmann, U. Vollmer: Binary Quadratic Forms

  15. J. Calmet, W. Geiselmann, J. Mueller-Quade: Mathematical Methods in Computer Science

  16. S. Chatterjee, P. Sarkar: Identity-Based Encryption

  17. H. Chen, E. Reid, J. Sinai, A. Silke, B. Ganor: Terrorism Informatics

  18. K.-K. R. Choo: Secure Key Establishment

  19. C. Cid, S. Murphy, M. Robshaw: Algebraic Aspects of the Advanced Encryption Standard

  20. P. H. Cole, D. C. Ranasinghe: Networked RFID Systems and Lightweight Cryptography

  21. E. Damiani, C. A. Ardagna, N. El Ioini: Open Source Systems Security Certification

  22. H. Delfs, H. Knebl: Introduction to Cryptography, Principles and Applications (2nd Edition)

  23. A. W. Dent, Y. Zheng: Practical Signcryption

  24. M. Dietzfelbinger: Primality Testing in Polynomial Time

  25. J. Ding, J. E. Gower, D. S. Schmidt: Multivariate Public Key Cryptosystems

  26. S. Foresti: Preserving Privacy in Data Outsourcing

  27. A. A. Ghorbani, W. Lu, M. Tavallaee: Network Intrusion Detection and Prevention

  28. M. Hafner, R. Breu: Security Engineering for Service-Oriented Architectures

  29. C. Hazay, Y. Lindell: Efficient Secure Two-Party Protocols

  30. D. Henrici: RFID Security and Privacy

  31. M. Higgins: Number Story: From Counting to Cryptography

  32. J. Hoffstein, J. Pipher, J. Silverman: An Introduction to Mathematical Cryptography

  33. J. Hromkovic: Algorithmic Adventures

  34. J. Hromkovic: Theoretical Computer Science

  35. J. M. Kizza: Guide to Computer Network Security

  36. L. R. Knudsen and M. J. B. Robshaw: The Block Cipher Companion

  37. Ç. K. Koç: Cryptographic Engineering

  38. L. Kocarev, S. Lian: Chaos-Based Cryptography

  39. L. C. Larson: Problem-Solving Through Problems

  40. W. Lee, C. Wand, D. Dagon: Botnet Detection

  41. K. Lemke, C. Paar, M. Wolf (Editors): Embedded Security in Cars

  42. R. J. Lipton: The P=NP Question and Gödel’s Lost Letter

  43. S. Mangard, E. Oswald, T. Popp: Power Analysis Attacks: Revealing the Secrets of Smart Cards

  44. K. Mayes, K. Markantonakis (Editors): Smart Cards, Tokens, Security and Applications

  45. K. Mehlhorn, P. Sanders: Algorithms and Data Structures: The Basic Toolbox

  46. P. Nguyen, Vallee: The LLL Algorithm

  47. F. Nielsen: A Concise and Practical Introduction to Programming Algorithms in Java

  48. C. Paar, J. Pelzl: Understanding Cryptography

  49. J. Rothe: Complexity Theory and Cryptology - An Introduction to Cryptocomplexity

  50. J. Rothe: Komplexitätstheorie und Kryptologie - Eine Einführung in die Kryptokomplexität [German]

  51. C. Rousseau, Y. Saint Aubin: Mathematics and Technology

  52. A.-R. Sadeghi, D. Naccache (Editors): Towards Hardware-Intrinsic Security: Foundations and Practice

  53. M. Sala, T. Mora, L. Perret, S. Sakata, C. Traverso (Editors): Gröbner Bases, Coding, and Cryptography

  54. D. Salomon: Elements of Computer Security

  55. B. Schneier: Beyond Fear

  56. A. Singh, B. Singh: Identifying Malicious Code Through Reverse Engineering

  57. P. Stavroulakis, M. Stamp: Handbook of Information and Communication Security

  58. H. Stichtenoth: Algebraic Function Fields and Codes (2nd Edition)

  59. Y. Sun, W. Trappe, K. J. R. Liu: Network-Aware Security for Group Communications

  60. P. Tuyls, B. Skoric, T. Kevenaar (Editors): Security with Noisy Data

  61. S. Vaudenay: A Classical Introduction to Cryptography: Applications for Communications Security

  62. S. Y. Yan: Cryptanalytic Attacks on RSA

  63. S. Y. Yan: Primality Testing and Integer Factorization in Public-Key Cryptography

  64. K. Yang, X. Jia: Security for Cloud Storage Systems


  1. R. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)

Go up.