IACR Newsletter The newsletter of the International Association for Cryptologic Research. Vol. 25, No. 1, Summer 2010 (Publication date: 15 June 2010). HTML version: http://www.iacr.org/newsletter/v25n1/ Contents * Registration for Crypto and CHES open * Message from the President * IACR Elections 2009 / Results * Upcoming Events * Service to members and the cryptographic community ** IACR Reading Room ** Open Positions ** ePrint ** IACR Archive * Book Reviews * Reports on past events * List of books for review Registration for Crypto and CHES open Both for Crypto 2010 and CHES 2010, the registration is open now. A novum this year, both events are co-located in Santa Barbara, CA, USA. At a glance: Crypto 2010, August 15-19 University of California, Santa Barbara Early bird registration: Thursday, July 15, 2010 Homepage: http://www.iacr.org/conferences/crypto2010/ CHES 2010, August 17-20 University of California, Santa Barbara Early bird registration: Thursday, July 15, 2010 Homepage: http://www.cs.ucsb.edu/~koc/ches/ches2010/ Message from the President I would like to invite you to read the Spring 2010 edition of our Newsletter. Christopher Wolf has done an excellent job in bringing you the news of our association; his initiative to start with book reviews has been an overwhelming success. In spite of financial crisis and the ash cloud in the European skies, IACR is doing well: we have about 1600 members, and our finances are in good shape. This is only possible through the continuous efforts of the volunteers, who generously donate their time to run the website, update the membership database and archive, manage our finances, and organize our flagship conferences and workshops. I would like to express my sincere thanks to all these volunteers, as well as to those who are involved in the scientific dimension, by running program committees, editing the Journal of Cryptology, and reviewing or writing papers. The Eurocrypt 2010 membership meeting has accepted the proposal from the Board to reduce the membership fee for 2012 (charged during 2011 events) from US$88 to US$70 (and from US$44 to US$35 for students). This reduction is justified because a move towards an electronic infrastructure has results in decreasing operating costs. The IACR Board is working on our publication strategy: we are planning to gradually move away from paper as distribution format (by making it optional) and we are considering to evolve towards free access to all our scientific publications. In 2010, the terms of three Directors and four Officers will expire. If you are interested in contributing to the IACR, please contact the members of the 2010 election committee (Josh Benaloh, Jean-Jacques Quisquater, and Serge Vaudenay). After a successful trial this Winter (see http://www.iacr.org/elections/eVoting/), the following resolution was submitted by the IACR Board and approved at the Eurocrypt 2010 membership meeting: "The IACR will adopt the Helios remote e-voting system for future IACR elections, after correcting issues that arose during the recent demo election; this includes the provision of a solution for non-Java clients. At the same time, the IACR will clearly publish a statement that its use of this system does not constitute an endorsement of this or other remote-voting systems for public-sector elections." In the next months, the remaining issues will hopefully be resolved; if so, a second vote will be held at the Crypto 2010 membership meeting. I would like to thank the Helios team (Ben Adida, Olivier de Marneffe, Olivier Pereira) and the IACR e-voting committee (Josh Benaloh, Stuart Haber, Shai Halevi) for their contributions. Bart Preneel IACR President IACR Elections 2009 / Results Election of Directors The elected directors are: * Tom Berson * David Naccache * Serge Vaudenay Their terms started on 1 January 2010 and will expire on 31 December 2012. We thank all the candidates, whether they were successful or not, for their significant support of IACR. In total, 325 ballots were cast. The detailed results are also available on the IACR-website. The members of the IACR 2009 Election Committee were Josh Benaloh, Ed Dawson, Christian Cachin Upcoming Events IACR Conferences * Crypto 2010, August 15-August 19, 2010, Santa Barbara, USA. * Asiacrypt 2010, December 5-December 9, 2010, Singapore, Singapore. * Eurocrypt 2011, May 15-19, 2011, Tallinn, Estonia. * Crypto 2011, August 14-18, 2011, Santa Barbara, USA. * Asiacrypt 2011, December 4-8, 2011, Seoul, Korea. * Eurocrypt 2012, April 15-19, 2012, Cambridge, UK. * Crypto 2012 (tentative), August 19-23, Santa Barbara, USA. IACR Workshops * Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), August 17-August 20, 2010, Santa Barbara, USA. * 18th International Workshop on Fast Software Encryption (FSE 2011), February 14-February 16, 2011, Lyngby, Denmark. * 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011), March 6-March 9, 2011, Taormina, Italy. * Theory of Cryptography Conference (TCC 2011), March 27-30, 2011 Providence, RI, USA. Events in cooperation with IACR * International Conference on Security and Cryptography (SECRYPT 2010), July 26-28, 2010, Athens, Greece. * First International Conference on Cryptology and Information Security in Latin A (Latincrypt 2010), August 8-11, 2010, Puebla, Mexico. * The 17th Annual Workshop on Selected Areas in Cryptography (SAC 2010), August 12-13, 2010, Waterloo, Canada. * 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), October 20-23, 2010, Shanghai, China. * Africacrypt 2011, July 4-8, 2011, Dakar, Senegal. Further events can be found here. You can also add your events or calls for special issues of journals there. Service to members and the cryptographic community Among others, IACR offers the following benefits: a. IACR Reading Room b. Open Positions c. ePrint d. IACR Archive a. Springer operates the so-called "IACR reading room". You can have online access to the online proceedings of IACR workshops and the Journal of Cryptology. If you don't have access yet, follow the following link: http://www.springer.com/iacr/ b. IACR provides a listing of open positions with a focus on cryptology. The listing is available on the Web here and kept up to date on a weekly basis: http://www.iacr.org/jobs/ c. The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions. http://eprint.iacr.org/ d. The proceedings of some conferences past are made available by the IACR in an archive. The copyright for these papers is held by the IACR: http://www.iacr.org/archive/ Book Reviews The following reviews are intended to help the IACR members and also the wider community to buy books in the area of cryptology and related areas. If you have any questions regarding the IACR book reviewing system, or would like to volunteer a review, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. In the latter case, first check the list of reviewable books if your favourite book is still available. At the moment, this list contains books of Taylor & Francis and Springer whose support we hereby gratefully acknowledge. Since 12 Feb 2010, we have many new titles available! In general, new books will be added around January and July to these lists. An updated list of book reviews can be found on the IACR-website. Below are the abstracts of all 42 reviews added since September 2009. You can access the full list via the following link. * M.W. Baldoni, C. Ciliberto, and G.M. Piacentini Cattaneo: "Elementary Number Theory, Cryptography and Codes", 2009: The book is an almost classical treatment of number theory and its applications to cryptography and coding theory. It involves more abstract notions than a classical elementary number theory book does and requires the reader to be familiar with certain algebraic structures. A prerequisite to fully benefit from this book would be a course in abstract algebra. I would recommend the book to various readers though the book speaks more to a mathematically mature reader who has a good understanding of abstraction. Review written by Yesem Kurt Peker (Randolph College, Lynchburg, Virginia, USA). (PDF) Publisher: Springer. ISBN: 978-3-540-69199-0 (Date: 2010-06-07) * Kim-Kwang R. Choo: "Secure Key Establishment", 2009: This book is targeted for researchers interested in designing secure cryptographic protocols. It begins with analysing and criticising previous security models for protocols and ends with tools to design better protocols. I would recommend this book, since it is a very valuable reference for me. Review written by Lakshmi Kuppusamy (Queensland University of Technology, Brisbane, Australia). (PDF) Publisher: Springer. ISBN: 978-0-387-87968-0 (Date: 2010-06-07) * Noureddine Boudriga: "Security of Mobile Communications", 2005: This book explores security features related to IP-mobility, mobile payments, multimedia applications, VoIP, and SIM-like cards. It includes information about various attacks and architectures capable of providing security features such as authentication, authorization, and access control in mobile communication systems. For this reason I recommend the book as a good resource for those interested in identifying and solving security issues in mobile communication systems and as a starting point for research in secure mobile communication. Review written by S.V. Nagaraj, (Hadhramout University, Yemen). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-0-8493-7941-3 (Date: 2010-06-07) * Richard A. Mollin: "Codes: The Guide to Secrecy from Ancient to Modern Times", 2005: This book is an encyclopedic work of a very high standard covering the most widely known and used cryptographic codes throughout history up until 2004 (book published in 2005). As well as describing cryptographic codes, there are pictures and biographies of key personnel in the field, as well as exercises and problems which may be used for creating courses that will reference this book. Review written by Kenneth J. Radke (Queensland University of Technology, Brisbane, Australia). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-1-584-884-705 (Date: 2010-05-27) * Hans Delfs and Helmut Knebl: "Introduction to Cryptography, Principles and Applications" (2nd Edition), 2007: I really enjoyed reading this book and I recommend it for students who have very basic understanding of cryptography and want to know more about mathematical basis and deeper concepts underlying cryptography. People who are focused more on topics like security management, system security, and network security are suggested to look for other books for introduction to cryptography. Review written by Hasan Mirjalili, (École Polytechnique Fédérale de Lausanne, Switzerland). (PDF) Publisher: Springer. ISBN: 978-3-540-49243-6 (Date: 2010-05-27) * Kerstin Lemke, Christof Paar, Marko Wolf (Eds.): "Embedded Security in Cars", 2006: Although this book was published around four years ago, it remains a very timely summary of security considerations in automotive electronics specification, design and use. Much of the material can be applied generically to embedded electronics, but there are also specific problems in vehicle electronics that need special attention. In any case, this book is an excellent security primer for those working in automotive electronics, and its lessons can be applied to many areas of embedded design beyond that. I commend it. Review written by Andrew Waterhouse, (Pacific Research, Sydney, Australia). (PDF) Publisher: Springer. ISBN: 978-3-540-28384-6 (Date: 2010-04-13) * Lawrence C. Washington: "Elliptic Curves - Number Theory and Cryptography" (2nd Edition), 2008: This book presents the theory of elliptic curves from the ground up leading to advanced topics of that area, including several parts on number theory. It is written in a dense style and is most suited for cryptographers and mathematicians. The book is a very valuable reference and qualifies for self-study. After digesting the book, the reader will have a thorough knowledge on elliptic curves as well as number theory. Half of the book will already be enough for most students and engineers. Review written by Vincent C. Immler (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-7146-7 (Date: 2010-04-12) * Richard A. Mollin: "Fundamental Number Theory with Applications" (2nd Edition), 2008: This book, written by a well-known Canadian number theorist, is intended for a one-semester undergraduate introductory course in number theory. Therefore, only undergraduates and the occasional dilettante (which may include professionals from affine branches of science who need this or that elementary result) will find it useful. The presentation flows smoothly and the main results can be perused quickly, although, to gain a deeper understanding, more time has to be devoted to their study. I have found the biographical sketches, with their anecdotical flavor, to be very interesting (it is the lesson I got from this book). Review written by Francesco Sica (University of Calgary, Canada). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-1-4200-6659-3 (Date: 2010-04-12) * Joachim Biskup: "Security in Computing Systems", 2009: The book tries to focus on the essentials of secure computing and aims to provide a collection of the most promising security mechanisms. To a large extent the book achieves this objective and this is one reason why I recommend this book. It is best suited for readers with a strong background in various aspects of securing computer systems. Review written by S.V. Nagaraj, (Hadhramout University, Yemen). (PDF) Publisher: Springer. ISBN: 978-3-540-78441-8 (Date: 2010-04-12) * Jintai Ding, Jason E. Gower, Dieter S. Schmidt: "Multivariate Public Key Cryptosystems", 2006: This book gives an overview of multivariate cryptography. It presents both multivariate schemes and attacks against them in great detail and contains many toy examples for them. The book is suitable both for master students and as a starting point for young researchers who want to start their own work in this new field of cryptography. Unfortunately, some of the more recent developments in multivariate cryptography are not contained in the book. Review written by Albrecht Petzold (TU Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 978-0-387-32229-2 (Date: 2010-04-12) * Joseph Migga Kizza: "Guide to Computer Network Security", 2009: This book gives a limited overview about ``Computer Network Security''. Although it gives a good historic overview about the topics mentioned it lacks a bit of up-to-dateness. Since most of the relevant topics are covered but only reviewed superficially the book is adequate for practitioners or undergraduates but not suitable for researchers. As a nice feature, the author offers additional comprehensive documents on his homepage (like a syllabus and complete set of Powerpoint slides covering a 15-week-course). An additional benefit is also given through the advanced exercises and complex projects at the end of each chapter. Review written by Kilian David (IT Auditor, Germany). (PDF) Publisher: Springer. ISBN: 978-1-84800-916-5 (Date: 2010-03-19) * Gildas Avoine, Philippe Oechslin, Pascal Junod: "Computer System Security: Basic Concepts and Solved Exercises", 2007: This book presents about 100 solved exercises on 8 main topics of Computer System Security. Each topic is briefly introduced before proposing the exercises. The exercises test your theoretical knowledge and your ability to solve more pragmatic problems through a few complex exercises. Review written by Eric Diehl (Security Competence Center, Thomson, Rennes, France). (PDF) Publisher: EPFL Press. ISBN: 978-1-420-04620-5 (Date: 2010-03-19) * Çetin Kaya Koç: "Cryptographic Engineering", 2009: This book is the first complete introduction to a Cryptographic Engineering. It addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. I really recommend Cryptographic Engineering to students and engineers working on implementations of cryptography in real life. As a cryptographic hardware level (ASIC and FPGA) designer, I am going to use this book as a reference in my daily work. Review written by Azzeddine Ramrami (CryptoDisk, France). (PDF) Publisher: Springer. ISBN: 978-0-387-71816-3 (Date: 2010-03-12) * Serge Vaudenay: "A Classical Introduction to Cryptography: Applications for Communications Security", 2006: This book is aimed at bridging the gap between cryptography and its standard applications. Most of the sections are rich in theory and hence, from my point of view, this is more suitable for research than for industry purposes. For me, it is one of the most precious books that I ever had and will always be on my shelf for any quick reference. Review written by Jothi Rangasami (Queensland University of Technology, Brisbane, Australia). (PDF) Publisher: Springer. ISBN: 978-0-387-25464-1 (Date: 2010-03-12) * Frank Nielsen: "A Concise and Practical Introduction to Programming Algorithms in Java", 2005: The book at hand by Frank Nielsen is a textbook mainly targeted to undergraduate students as a very first course in programming. Following the demands of the targeted audience, the book introduces the topics programming and algorithms without requiring prior knowledge. More advanced topics and concepts such as for example object orientation are intentionally omitted in order to stay focused with the bookâs goal. This book is not only a valuable source for undergraduate students but also for lecturer who can benefit from this book in terms of a source for many programming examples and exercises. Review written by Luigi Lo Iacono (NEC Laboratories Europe, Heidelberg, Germany). (PDF) Publisher: Springer. ISBN: 978-1-84882-338-9 (Date: 2010-03-09) * Jürgen Rothe: "Complexity Theory and Cryptology - An Introduction to Cryptocomplexity", 2005: This book about complexity theory and its application in modern cryptology is interesting and highly valuable for educational purposes, mainly because it yields a new and ingenious way to access modern cryptographic research results. The target audience comprises undergraduate and graduate students in computer science, mathematics, and engineering, but the book is also recommended reading (and a valuable source of information) for researchers, university teachers, and practitioners working in the ï¬eld. Furthermore, it is exceptionally well suited for self-study. This makes the book so unique that it should be part of any library on cryptology or complexity theory. Review written by Rolf Oppliger (eSECURITY Technologies and University of Zurich, Switzerland). (PDF) Publisher: Springer. ISBN: 978-3-540-22147-0 (Date: 2010-03-09) * Jürgen Rothe: "Komplexitätstheorie und Kryptologie - Eine Einführung in die Kryptokomplexität", 2008: Das zur Diskussion stehende Buch ist die deutschsprachige Übersetzung des Buches Complexity Theory and Cryptology - An Introduction to Cryptocomplexity (s.o.). Es behandelt die Komplexitätstheorie bzw. deren Anwendung in der Kryptologie und ist aus didaktischer Sicht wertvoll, weil es insbesondere einen neuen und in seiner Art auch einzigartigen Zugang zu Forschungsresultaten der modernen Kryptograï¬e verschafft. Das Buch wendet sich an Studenten und Studentinnen der Informatik, der Mathematik und des Ingenieurwesens. Natürlich kann das Buch auch Forschern, Dozierenden und Praktikern empfohlen werden. Schliesslich eignet sich das Buch auch zum Selbststudium. Vom Thema und Aufbau her ist das Buch so einzigartig, dass es in jede Bibliothek über Kryptologie oder Komplexitätstheorie gehört. Review written by Rolf Oppliger (eSECURITY Technologies and University of Zurich, Switzerland). (PDF) Publisher: Springer. ISBN: 978-3-540-79744-9 (Date: 2010-03-09) * Dirk Henrici: "RFID Security and Privacy", 2008: This book presents the topic of RFID Security and Privacy in the framework of pervasive computing. Written in a dense style, which requires careful digestion and analysis, this book presents a novel and very useful picture of an outspread RFID system with many tag owners and tags, interacting in a standardised infrastructure. I would strongly recommend this book to anyone interested in an in-depth study of the potential uses and constraints of large-scale RFID authentication. A preferred target would be academic researchers in this field, although the practical considerations included in this work may interest industry research labs as well. Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-79075-4 (Date: 2010-03-09) * Martin Aigner, Günter M. Ziegler: "Proofs from THE BOOK, 4th Edition", 2010: "The Book", as promulgated by Paul ErdÅs, is God's collection of the most elegant proofs of any and all mathematical theorems, including those still to be discovered. In "Proofs from THE BOOK" Martin Aigner and Günter M. Ziegler attempt to gather together a collection of proofs which, in their opinion, should be included in "The Book". Browsing through the proofs one gets a sense of the rich creative process involved in proving theorems. "Proofs from THE BOOK" is written in a relaxed style which can be best described as a blend between a university level textbook and an article from Scientific American. It is highly recommendable, for unlike many popularizations of science and mathematics, it delves into real theorems not muddy metaphors or inconsistent analogies. Review written by Gregory Kohring (Freelance Analyst, Germany). (PDF) Publisher: Springer. ISBN: 978-3-642-00855-9 (Date: 2010-03-09) * Douglas Jacobson: "Introduction to Network Security", 2009: This book gives a good overview on Network Security. It starts from the lower layer and shows how each other layer can contribute to the overall security of the system. On the one hand students in Computer Science / Network Security might be interested in this book and on the other hand security professionals can use it as a convenient reference book. It won't get dusty on my shelf, as it contains so many precious information, and is enjoyable to read. Review written by Olivier Blazy (Ecole Normale Supérieure, Paris, France). (PDF) Publisher: CRC Press, Taylor & Francis ISBN: 978-1-58488-543-6 (Date: 2010-02-01) * Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor: "Terrorism Informatics", 2009: The book gives a good state of the art of the Terrorism Informatics field, focusing mainly on methodological issues in the first part and on how to handle suspicious data on the second. Its audience is very broad: on the one hand, specialists (scientific, experts, policy makers) can find useful information, on the other hand, the book is really accessible to students. Review written by Olivier Blazy (Ecole Normale Supérieure, Paris, France). (PDF) Publisher: Springer. ISBN: 978-0-387-71612-1 (Date: 2010-01-21) * Jonathan Katz, Yehuda Lindell: "Introduction to Modern Cryptography", 2008: This book is a comprehensive, rigorous introduction to what the authors name ''Modern'' Cryptography. One of the book's best qualities is the remarkably logical and systematic style in which the authors present several cryptographic primitives and constructions. A disadvantage of this book in my opinion is that it does not delve deeper into cryptographic methods such as authentication with limited resources, such as RFID, or PUF-based authentication. The reader must be familiar with some basic mathematical concepts and the science of proving statements, thus this book is not suited for the industry but rather for graduate students. However, even a versed cryptographer will benefit from the rigorous and complete treatment of the mentioned topics. I would heartily recommend this book to anyone who is interested in cryptography. Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (PDF) Publisher: CRC Press, Taylor & Francis Group. ISBN: 978-1-58488-551-1 (Date: 2010-01-13) * Gregory V. Bard: "Algebraic Cryptanalysis", 2009: This book introduces the predominant topics in multivariate-base cryptanalysis. It can be described to be a complementary text book in the ï¬eld of algebraic attack as a result of the author's experience and knowledge. For a person who did not know much about algebraic cryptanalysis, this book is a good starting point. Review written by Wael Said Abdel mageed Mohamed (Cryptography and Computeralgebra, Informatik, TU Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 978-0-387-88756-2 (Date: 2010-01-13) * Friederich L. Bauer: "Historische Notizen zur Informatik" (German), 2009: This book is a collection of trivia about the history of computer science and mathematics. You can learn this and that from it, but it is nevertheless a book to enjoy reading. Maybe a nice gift to everybody from this field who likes to read. Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-85789-1 (Date: 2010-01-12) * M. Jason Hinek: "Cryptanalysis of RSA and its Variants", 2010: This book sums up traditional attacks on RSA and gives a lot of information about the newer lattice-based attacks. It uses a lot of mathematics, but explains it pretty well. It seems like a very good book to get an overview over attacks on RSA. Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF) Publisher: CRC Press, Taylor & Francis Group. ISBN: 978-1-4200-7512-2 (Date: 2010-01-08) * Song Y. Yan: "Primality Testing and Integer Factorization in Public-Key Cryptography", 2009: The author knows how to show that "the theory of numbers is one of the most beautiful and pure parts of mathematics" and how to fascinate the reader for this subject. The book can be recommended without any restrictions. It is suitable as text book and/or reference book for anybody interested in Primality Testing or Integer Factorization being student, researcher or amateur. This book will definitely not get dusty in the reviewer's book shelf! Review written by Joerg Gerschuetz (International School of IT Security, Bochum, Germany). (PDF) Publisher: Springer. ISBN: 978-0-387-77267-7 (Date: 2010-01-07) * Yan Sun, Wade Trappe and K.J.R. Liu: "Network-Aware Security for Group Communications", 2008: This book gives an introduction to group key management protocols in different network settings. It can be recommended to early researchers in the areas of group key management, secure multicast and secure communication in sensor networks. The book discusses various security issues in group communications in a network-aware approach. However, it fails to show how to rigorously analyze group key management protocols with respect to these identified security issues. Review written by Choudary Gorantla (Information Security Institute, Queensland University of Technology, Australia). (PDF) Publisher: Springer. ISBN: 978-0-387-68846-6 (Date: 2010-01-06) * Darel W. Hardy, Fred Richman, and Carol L. Walker: "Applied Algebra - Codes, Ciphers, And Discrete Algorithms", 2009: The book introduces algebraical concepts which are used in cryptography and coding and shows their applications in these fields. The strength of the book is clearly the number of examples which on the other side in some case unfortunately leads to a lack of general definitions and theorems. Therefore this book is suitable for student who prefer learning by doing (the book provides many exercise) but is not suitable as a handbook. I would also not recommend the book for mathematics student or students which already have a good mathematical background or a strong background in cryptography or coding as they would know already large parts of the book. Review written by Julia Borghoff (DTU Mathematics, Technical University of Denmark). (PDF) Publisher: CRC Press, Taylor & Francis Group. ISBN: 978-1-4200-7142-9 (Date: 2010-01-05) * Johannes Buchmann: "Introduction to Cryptography", 2004: As the title states the book by Johannes Buchmann provides an introduction to cryptography. It gives a general mathematical background in the beginning and particular mathematical preliminaries are provided at the time they are needed to understand some specific cryptographic method. This text is recommended for undergraduate students or readers who want to get an overview of some modern cryptographic methods and their mathematical preliminaries, like for example RSA and DES. Review written by Mohamed Saied Emam Mohamed (Technical University of Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 0-387-21156-X (Date: 2010-01-05) * Michael Hafner and Ruth Breu: "Security Engineering for Service-Oriented Architectures", 2009: The book by Hafner and Breu gives an overview on how to systematically design and realize security-critical service-based applications following the model-driven development methodology. Whenever the book talks about SOA or services, it is talking about the technical realisation of SOA using SOAP and related technologies and standards. Currently the audience mainly benefiting from this book is regarded students and researchers. Review written by Luigi Lo Iacono (NEC Laboratories Europe, Heidelberg, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-79538-4 (Date: 2009-12-04) * Peter H. Cole and Damith C. Ranasinghe: "Networked RFID Systems and Lightweight Cryptography", 2008: This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains. Written in a fluent, but not overworded fashion, this work represents both a good starting point for students beginning to work in the area of RFID, and a reference for those who are rather more advanced in this field. It provides a great background for those interested in the topic of RFID in general and supply-chain-RFID in particular. A preferred target audience would be researchers in this field, rather than those working in the industry. Further study of the various references quoted in the book is not only recommendable, but necessary, as the authors present only succinctly the topic of other papers or books. Review written by Cristina Onete (CASED - Center for Advanced Security Research Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-71640-2 (Date: 2009-12-04) * F.L. Bauer: "Decrypted Secrets - Methods and Maxims of Cryptology", 2009: As the subtitle reveals, the book discusses different methods and maxims of cryptology. This book can be recommended to everyone who has mathematical, informatical, historical or linguistic interests in cryptography. There are different ways of approaching this book. Due to its vivid style, it can be read linear as a novel, but it can also be used as reference work for specific topics. Review written by Denise Reinert (ISEB---Institute for Security in E-Business, Ruhr University, Bochum, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-24502-5 (Date: 2009-11-22) * F.L. Bauer: "Entzifferte Geheimnisse - Methoden und Maximen der Kryptologie" (German), 2009: Wie der Untertitel bereits verrät, behandelt das Buch Entzifferte Geheimnisse verschiedene Methoden und Maximen der Kryptologie. Dieses Buch ist für jeden empfehlenswert, der sich aus mathematischer, informationstechnischer, historischer oder sprachlicher Sicht für Kryptographie interessiert. Dabei gibt es verschiedene Herangehensweisen, das Buch zu lesen. Durch den lebhaften Stil kann es durchaus linear als Roman gelesen werden, jedoch ist es auch als Nachschlagewerk für einzelne Bereiche geeignet. Review written by Denise Reinert (ISEB---Institute for Security in E-Business, Ruhr University, Bochum, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-67931-8 (Date: 2009-11-22) * Massimiliano Sala, Teo Mora, Ludovic Perret, Shojiro Sakata, and Carlo Traverso (Editors): "Gröbner Bases, Coding, and Cryptography", 2009: The book edited by Max Sala and other renowned experts is a collection of chapters and small notes devoted to the topic of application of Gröbner bases in coding and cryptography. Gröbner bases appeared in 1960s and nowadays is an established tool in computational algebra. Quite recently applications of this technique have been found in coding theory (decoding, fining minimum distance) and cryptology (multivariate-based cryptography, algebraic cryptanalysis). This book has all the material needed to get an overview of the exciting area. Review written by Stanislav Bulygin (CASED - Center for Advanced Security Research Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 978-3-540-93806-7 (Date: 2009-11-22) * Keith Mayes and Konstantinos Markantonakis (editors): "Smart Cards, Tokens, Security and Applications", 2008: This book is an introduction to the world of smart cards and secure components. It describes some of the main applications using smart cards: mobile phone, banking, Pay TV and ID cards. It briefly explores advanced topics such as life cycle management, development environments (Java card, MultOS, SIM toolkit, ...) or Common Criteria. If you're looking for a quick tour about smart cards, then this may be your book. Review written by Eric Diehl (Security Competence Center, Thomson, Rennes, France). (PDF) Publisher: Springer. ISBN: 978-0-387-72197-2 (Date: 2009-11-10) * Abhishek Singh and Baibhav Singh: "Identifying Malicious Code Through Reverse Engineering", 2009: This book gives a little introduction into assembly, shows how a PE looks like, how vulnerabilities look like in assembly code and shows you some stumbling blocks when reverse-engineering code. It is full of spelling mistakes and does not cover the topic the title promises. Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF) Publisher: Springer. ISBN: 978-0-387-09824-1 (Date: 2009-11-03) * Carlos Cid, Sean Murphy, and Matthew Robshaw: "Algebraic Aspects of the Advanced Encryption Standard", 2006: In their book the authors give an algebraic perspective of the Advanced Encryption Standard (AES). The way the book is written is overall pleasant. The reader who is ok with mathematical language should have no problem reading it. The material is not overwhelmed with heavy mathematical results/proofs/notions. Considering that the book contains also necessary mathematical background overview, it is readable for engineers and cryptographers without a particular pre-knowledge of algebra. Review written by Stanislav Bulygin (CASED - Center for Advanced Security Research Darmstadt, Germany). (PDF) Publisher: Springer. ISBN: 0-387-24363-1, 978-0-387-24363-4 (Date: 2009-11-02) * Song Y. Yan: "Cryptanalytic Attacks on RSA", 2008: The book is the state of the art encyclopedia of RSA encryption algorithm. It is well-structured and can be used as lecture notes for any university cryptographic course or student research project. It is the most relevant and self-explanatory book about RSA and is very helpful for students and teachers. Review written by Yuriy R. Aydarov (Perm State University, Russia). (PDF) Publisher: Springer. ISBN: 978-0-387-48741-0 (Date: 2009-11-02) * Adam J. Elbirt: "Understanding and Applying Cryptography and Data Security", 2009: And now how do I implement that? If you have some day wondered how to implement your cryptographic result, this book is here to help you... From symmetric-key to public-key cryptography, from signatures to MAC, you'll may find the answer you are looking for in there. Review written by Olivier Blazy (Ecole Normale Supérieure, Paris, France). (PDF) Publisher: CRC Press, Taylor & Francis Group. ISBN: 978-1-4200-6160-4 (Date: 2009-11-01) * Karl de Leeuw and Jan Bergstra (editors): "The History of Information Security - A Comprehensive Handbook", 2007: This magisterial book, of almost 900 pages, has joined Kahn, Yardley and Welchmann on my shelf of serious reference works. Yet it contains much that I found new, surprising and even delightful, despite a quarter century of working in the field. Review written by Ross Anderson (University of Cambridge, Computer Laboratory). (PDF) Publisher: Elsevier. ISBN: 0444516085, 978-0444516084 (Date: 2009-10-27) * Shiguo Lian: "Multimedia Content Encryption: Techniques and Applications", 2009: This book gives a good starting point for research concerning the special requirements multimedia content has of cryptography. It takes various types of encryption, compression, watermarking and fingerprinting into account. Readers with background in cryptography and interest in the topic of multimedia encryption should be satisfied. Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF) Publisher: CRC Press, Taylor & Francis Group. ISBN: 1-4200-6527-0, 978-1-4200-6527-5 (Date: 2009-10-20) * Gabriel Valiente: "Combinatorial Pattern Matching Algorithms in Computational Biology using Perl and R", 2009: The book holds what its cover promises: It is a well-sorted collection of pattern matching algorithms that are used to work with problems in computational biology. Only shortcoming is the missing runtime-analysis. All in all, it is recommended, in particular for students of computational biology or bioinformatics. Review written by Jannik Pewny (Horst Görtz Institute, Ruhr University Bochum, Germany). (PDF) Publisher: CRC Press, Taylor & Francis Group. ISBN: 1-4200-6973-X, 978-1-4200-6973-0 (Date: 2009-10-07) Reports on Past Events Crypto 2009, August 16-20th, 2009, Santa Barabara, USA CRYPTO 2009 was held, as always, in Santa Barbara, California, from August 16 to 20 under mostly-clear skies. The schedule was standard, with catered dinners Sunday and Monday along with a beach bbq on Wednesday. In attendance were 352 delegates from 37 countries, 113 being students. Delegates enjoyed a schedule of 38 regular conference presentations and two invites talks, one by Ed Felten and the other by Ueli Maurer. Dan Bernstein was Rump Session chair. Video and slides for most talks and the rump session can be found on the conference site at http://www.iacr.org/conferences/crypto2009/program.html. Providing a small-font copy of the conference schedule as a badge insert turned out to be a hit, as were the black fleece vests. Any delegates who paid full registration and did not receive a vest should have been mailed one; if not, contact CRYPTO 2009 General Chair John Black. The conference puzzle was \sum_{n=0}^\infty (2n^7+n6^+n^5)/n! which turned out to be 2009e. Eight correct answers were received, with the winner being randomly drawn from them to earn his locally-produced bottle of wine. Many thanks to all who worked hard to produce this successful conference, especially to Program Chair Shai Halevi and his Program Committee along with Sally Vito and her staff as well as the tireless IACR board. Asiacrypt 2009, December 6-10, 2009, Tokyo, Japan Asiacrypt 2009 was held in Tokyo Japan from December 6 to 10. There were more than 300 participants from over 35 countries. The program included 41 papers selected out of 300 submissions, a rump session in the evening of December 7 and an IACR distinguished lecture given by Dr. Tatsuaki Okamoto in the afternoon session of December 9. All these technical sessions were held at Hitotsubashi Memorial Hall and the banquet was held at Meiji Kinenkan in the evening of December 9 with Japanese food and Mochitsuki (Rice ball cooking) and Koto (Japanese traditional instruments) performances. General chair was Eiji Okamoto and program chair was Mitsuru Matsui. Eurocrypt 2010, May 30-June 3, 2010, French Riviera, France Eurocrypt 2010 was held May 30-June 3, 2010 on the French Riviera: the technical sessions were held at the Grimaldi Forum in Monaco while the social event took place on the beach in Nice. The conference was attended by 389 participants 88 of whom were students. The participants came from 40 countries. After an intensive reviewing process (606 reports were produced) of the 188 valid submissions, 33 papers were eventually selected (17.6% acceptation rate). The conference program covered a very large range of topics among which lattice based designs, cryptanalyses, and cryptographic protocols. The best paper award was given to David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert for their paper "Bonsai Trees, or How to Delegate a Lattice Basis". Moti Yung gave the 2010 IACR Distinguished Lecture entitled "Cryptography between Wonderland and Underland". Dan Bernstein and Tanja Lange served as rump session chairs and their four vuvuzela holders enforced the time schedule for the 23 presentations. The full program can be seen at http://crypto.rd.francetelecom.com/events/eurocrypt2010/program. The conference organizers are grateful to the sponsors I3S, Ingenico, Microsoft, Nagravision, Oberthur, Orange Labs, Sagem Sécurité, Technicolor, and Qualcomm for their generous support in the difficult economical setting. Qualcomm's support allowed the fees of 7 students attendees to be waived. Program chair was Henri Gilbert, general chairs were Olivier Billet and Matt Robshaw. CHES 2009, September 6-9, 2009, Lausanne, Switzerland The 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009) was held in Lausanne, Switzerland, from September 6 to 9. With 312 registered participants from 32 countries (including 70 students), it was not only the largest CHES ever, but also the largest IACR International Workshop. The local organization was in the hands of the Laboratory for Cryptologic Algorithms (LACAL) at the École Polytechnique Fédérale de Lausanne (EPFL). The conference venue was at the EPFL. On Monday evening, the participants enjoyed a Dinner cruise on Lake Geneva and appreciated the Lavaux vineyards (designated part of the UNESCO World Heritage), the Chillon Castle and experienced the sunset in the Alpine scenery. The Rump Session took place at the Casino Montbenon, a Centrex for cultural and social event, surrounded by magnificent gardens with an unparalleled view of the mountains and the lake. The CHES program committee received 148 submissions (the largest number of submissions in CHES ever). After an intensive review and discussion process, 29 regular papers (19.8%) were accepted. The program was complemented by three invited talks: Srini Devadas spoke on "Physical Unclonable Functions and Secure Processors"; Christof Paar on "Crypto Engineering: Some History and Some Case Studies" and Randy Torrance on "The State-of-the-Art in IC Reverse Engineering". The program included two special sessions "DPA Contest" chaired by Elisabeth Oswald and "Benchmarking of Cryptographic Hardware" chaired by Patrick Schaumont. Three best papers were awarded: "Faster and Timing-Attack Resistant AES-GCM" by Emilia Käsper and Peter Schwabe, "Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers" by Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, and Francisco Rodríguez-Henríquez, and "A New Side-Channel Attack on RSA Prime Generation" by Thomas Finke, Max Gebhardt and Wener Schindler. The rump session chaired by Guido Bertoni consisted on 9 scientific presentations, and 7 funny talks and announcements. Program co-chairs were Kris Gaj and Christophe Clavier, General chair was Marcelo E. Kaihara. FSE 2010, February 7-10, 2010, Seoul, Korea FSE 2010 was held in Seoul, Korea, from February 7 to 10, 2010. The program included 21 papers that cover wide aspects of symmetric cryptography and two invited talks; "The Survey of Cryptanalysis on Hash Functions" by Xiaoyun Wang and "A Provable-Security Perspective on Hash Function Design" by Thomas Shrimpton. Also, the program included the rump session which was organized and chaired by Orr Dunkelman. The Program Committee selected the paper "Attacking the Knudsen-Preneel Compression Functions" by Onur Ö>zen, Thomas Shrimpton, and Martijn Stam to receive the best paper award. The workshop took place at Koreana Hotel, and there were 118 participants from 25 countries. On Monday evening, participants enjoyed NANTA, a funny, non-verbal, and rhythmical Korean performance. The gala dinner was held at the traditional Korean restaurant, SamcheongGak on Tuesday evening. The workshop organizers gratefully acknowledge CIST, Korea University and Korea Institute of Information Security and Cryptology (KIISC) for their support in organizing the workshop. The financial support by Electronics and Telecommunications Research Institute (ETRI), Ellipsis, Korea University, LG CNS, and National Institute for Mathematical Science (NIMS) is also gratefully acknowledged. Program Co-chairs were Seokhie Hong and Tetsu Iwata, and General Co-chairs were Jongin Lim and Jongsung Kim. TCC 2010, February 9-11, 2010, Zurich, Swiss TCC 2010 took place at ETH Zurich from February 9 to 11. More than 100 researches from 19 countries attended the conference. The technical program included 33 talks of accepted papers and two invited talks given by Jan Camenisch ("Privacy-enhancing cryptography: From theory into practice") and Yuval Ishai ("Secure computation and its diverse applications"). Furthermore, there were 18 short talks at the rump session, which was chaired by Nelly Fazio. The social program included, besides the usual lunches, coffee breaks, and rump session dinner, also a Fondue cooked by the participants, and a farewell reception with fresh juices and fruits. The conference was sponsored by Credit Suisse, Microsoft Research, Omnisec, and Google. Furthermore, we had sponsored chocolate from Laederach and sponsored coffee from Nespresso. Program chair was Daniele Micciancio, General chairs were Martin Hirt and Ueli Maurer. Public Key Cryptology (PKC 2010), May 26-28, 2010, ENS Paris, France The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010) was held at the École Normale Supérieure (ENS) in Paris, France from May 26 to 28, 2010. With 162 registered participants (including 41 students) from 26 countries, it was the biggest PKC ever. Though most of the participants came from France (49), several countries such as Japan (18), United States (17), United Kingdom (13), Germany (11), and China (7) were also well represented. The local organization was led by the ENS Crypto Team and the Office for Courses and Colloquiums (Bureau des Cours-Colloques) from the French National Institute for Research in Computer Science and Control (INRIA). The conference received a record number of 145 submissions. After an intensive review and discussion process, 29 submissions were selected for publication and presentation at the conference. The final program was well balanced, covering various aspects of public key cryptography. The best paper was awarded to Petros Mol and Scott Yilek for their paper "Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions". The full program also included two invited talks. Jacques Stern from ENS gave a talk titled "Mathematics, Cryptography, Security" and Daniele Micciancio from UCSD spoke about "Duality in Lattice Based Cryptography". The social program involved a banquet at La Maison Des Polytechniciens on the second evening and a cocktail party at ENS on the last day of the conference. The conference organizers would like to thank our sponsors Google, Ingenico, and Technicolor for their financial support as well as ENS for hosting the conference. Program Co-chairs were Phong Q. Nguyen and David Pointcheval, and General Co-chairs were Michel Abdalla and Pierre-Alain Fouque. International Conference on Information Theoretic Security (ICITS 2009), December 3-6, 2009, Shizuoka, Japan The 4th International Conference on Information Theoretic Security(ICITS 2009) was held in Shizuoka, Japan from December 3 to 6. There were 75 participants from over 13 contries. The meeting took place at the Shizuoka Convention & Arts Center "GRANSHIP". The banquet was held at the Fugetsuro Restaurant with featured live performances highlighting traditional Japanese culture to delight all those attending. The ICITS program committee received 50 submissions. After an intensive review and discussion process, 13 papers were accepted.The program was complemented by 6 invited talks. Yevgeniy Dodis "Leakage-Resilience and The Bounded Retrieval Model", Masato Koashi "Security of Key Distribution and Complementarity in Quantum Mechanics", Kazukuni Kobara "Code-Based Public-Key Cryptosystems And Their Applications", Prakash Narayan "Multiterminal Secrecy Generation and Tree Packing", Adi Shamir "Random Graphs in Security and Privacy" and Adam Smith "What Can Cryptography Do for Coding Theory?". The full program and slides of the invited speakers are available from the following URL. The conference was received financial support from Support Center for Advance Telecommunications Technology Research and Kayamori Foundation of Informational Science Advancement. We also received local support from Shizuoka Convention & Visitors Bureau. Program Chair was Kaoru Kurosawa, General Chair was Akira Otsuka. Inscrypt 2009, December 12-15, 2009, Beijing, China Inscrypt 2009 was held in Beijing China from December 12 to 15, there were nearly 130 participants from 17 countries. This conference was held in Beijing Friendship Hotel. The banquet was held at the Ju Xiu Yuan Friendship Palace on the evening of December 14. The conference organizers are State Key Laboratory of Information Security and Chinese Association for Cryptologic Research. Programme chairs are Feng Bao and Moti Yung, General chair was Dengguo Feng. List of books for review The books below are available for review. If you are interested or have any other question regarding the IACR book reviewing system, please contact Axel Poschmann (Nanyang Technological University, Singapore) via books at iacr.org. New book reviews are posted continiously. If you are interested in reviewing any other books from Taylor & Francis or Springer, please send me an eMail, too. I am pretty sure that I can organize this book. I did not try yet for other publishers, but the process is pretty straight forward, i.e. if you want to review a book from any other publisher, send me an eMail, too. However, it may take a while. Reviewing Guidelines So, what should a review look like? Keep in mind that your review should be helpful for the reader. So summarize its content and then give examples for very good and very bad parts. Give an overall conclusion (e.g. this book could be particular helpful for the following group, is over the top / too easy for...). If your review is longer than the book or shorter than the text on its back, something went wrong. Apart from that, there are not guidelines. Just start reviewing and assume you would be reading your review. Would you like it? So the key questions are: * What is this book about (summary)? * What is the book like (style)? * Would you recommend this book (if yes: for whom?)? * Would your review be helpful for yourself? Prefered format is PDF, see previous reviews or our LaTeX-Template. In addition, I need a 3-10 line "teaser" which more or less summarizes the whole review. In addition, you can also look at other reviews to get an idea what to cover. When requesting a book, please do also include your surface address! After receiving the book, you have 2 month to complete the review. If you have any further questions, please contact Axel Poschmann via books at iacr.org. Available Books Please note that every book is only reviewed once and books currently under review are marked in the list below as follows: [Date Name]. Go to titles from: * Springer * Taylor & Francis Springer Below you find a selection of books from Springer. Further titles are available via Springer's website. 1. Adjeroh: The Burrows-Wheeler Transform 2. [done Gregory Kohring] Aigner: Proofs from THE BOOK 3. [done Gregory Kohring] Aigner: Das BUCH der Beweise [German] 4. [2009-12-17 Abdelhak Azhari] Baigneres: A Classical Introduction to Cryptography Exercise Book 5. [done Yesem Kurt Peker] Baldoni: Elementary Number Theory, Cryptography and Codes 6. [done Wael Said Abd Elmageed Mohamed] Bard: Algebraic Cryptanalysis 7. [done Denise Reinert] Bauer: Decrypted Secrets 8. [done Denise Reinert] Bauer: Entzifferte Geheimnisse [German] 9. [done Jannik Pewny] Bauer: Historische Notizen zur Informatik [German] 10. [!2010-05-01 Sebastian Gajek] Bella: Formal Correctness of Security Protocols 11. [!2010-02-28 Ludovic Perret] Bernstein: Post-Quantum Cryptography 12. Biggs: Codes: An Introduction to Information Communication and Cryptography 13. [done S.V.Nagaraj] Biskup: Security in Computing Systems 14. Buchmann: Binary Quadratic Forms 15. [done Mohamed Saied Emam Mohamed] Buchmann: Introduction to Cryptography 16. Calmet: Mathematical Methods in Computer Science 17. [2009-08-19 Joerg Schwenk] Camp: Economics of Identity Theft 18. [done Olivier Blazy] Chen: Terrorism Informatics 19. [!!2010-06-15 Lakshmi Kuppusamy] Choo: Secure Key Establishment 20. [done Stanislav Bulygin] Cid: Algebraic Aspects of the Advanced Encryption Standard 21. [done Cristina Onete] Cole: Networked RFID Systems and Lightweight Cryptography 22. [!2010-06-15 Meiko Jensen] Damiani: Open Source Systems Security Certification 23. [done Seyyd Hasan Mirjalili] Delfs: Introduction to Cryptography 24. [not yet published Safuat Hamdy] Desmedt: Secure Public Key Infrastructure 25. Dietzfelbinger: Primality Testing in Polynomial Time 26. [done Albrecht Petzold] Ding: Multivariate Public Key Cryptosystems 27. Di Pietro: Intrusion Detection Systems 28. Fine: Number Theory 29. Gomes: Implicit Curves and Surfaces: Mathematics, Data Structures, and Algorithms 30. [done Luigi Lo Iacono] Hafner: Security Engineering for Service-Oriented Architectures 31. [done Cristina Onete] Henrici: RFID Security and Privacy 32. [!2010-04-09 Paolo Palmieri] Higgins: Number Story 33. Hoffstein: An Introduction to Mathematical Cryptography 34. Hromkovic: Algorithmic Adventures 35. [not yet published Marc Joye] Katz: Digital Signatures 36. [done Kilian David] Kizza: Guide to Computer Network Security 37. Koblitz: Random Curves 38. [done Azzeddine Ramrami] Koç: Cryptographic Engineering 39. Kuo: Precoding Techniques for Digital Communication Systems 40. [2010-01-07 Joerg Gerschuetz] Lee: Botnet Detection 41. [done Andrew Waterhouse] Lemke: Embedded Security in Cars 42. Li: An Introduction to Kolmogorov Complexity and Its Applications 43. [!2010-05-30 Arnaud Tisserand] Mangard: Power Analysis Attacks 44. [done Eric Diehl] Mayes: Smart Cards, Tokens, Security and Applications 45. Mehlhorn: Algorithms and Data Structures 46. [2010-01-27 Ulrich Dürholz] Micheloni: Error Correction Codes for Non-Volatile Memories 47. [done Luigi Lo Iacono] Nielsen: A Concise and Practical Introduction to Programming Algorithms in Java 48. Onieva: Secure Multi-Party Non-Repudiation Protocols and Applications 49. [2010-03-10 Luigi Lo Iacono] Paar: Understanding Cryptography - A Textbook for Students and Practioners 50. Portnoy: Global Initiatives to Secure Cyberspace 51. Robshaw: New Stream Cipher Designs 52. Rodríguez-HenrÃquez: Cryptographic Algorithms on Reconfigurable Hardware 53. Rosen: Concurrent Zero-Knowledge 54. [done Rolf Oppliger] Rothe: Komplexitätstheorie und Kryptologie [German] 55. [2010-03-31 Eric Diehl] Rousseau: Mathematics and Technology 56. Salomon: A Concise Introduction to Data Compression 57. [done Stas Bulygin] Sala: Gröbner Bases, Coding, and Cryptography 58. Sammes: Forensic Computing 59. Schellekens: A Modular Calculus for the Average Cost of Data Structuring 60. [!2010-01-30 Erik Tews] Schneier: Beyond Fear 61. Schroeder: Number Theory in Science and Communication 62. Shi: Transactions on Data Hiding and Multimedia Security III 63. [done Jannik Pewny] Singh: Identifying Malicious Code Through Reverse Engineering 64. [2010-02-28 Steven Galbraith] Stichtenoth: Algebraic Function Fields and Codes 65. Stolfo: Insider Attack and Cyber Security 66. [done Choudary Gorantla] Sun: Network-Aware Security for Group Communications 67. Traynor: Security for Telecommunications Networks 68. Tuyls: Security with Noisy Data 69. Vadhan: A Study of Statistical Zero-Knowledge Proofs 70. [done Jothi Rangasamy] Vaudenay: A Classical Introduction to Cryptography 71. Vöcking: Taschenbuch der Algorithmen [German] 72. [!2010-07-15 Mario Strefler] Wang: Computer Network Security 73. [done Joerg Gerschuetz] Yan: Primality Testing and Integer Factorization in Public-Key Cryptography 74. [done Yuriy Aydarov] Yan: Cryptanalytic Attacks on RSA 75. Yeung: Information Theory and Network Coding Taylor & Francis Below you find a selection of books from Taylor & Francis. Titles added on 12 February 2010 are marked with New! at the beginning. Further titles are available via Taylor & Francis's website. 1. Acquisti, A.: Digital Privacy: Theory, Technologies, and Practices 2. [done Eric Diehl] Avoine, Gildas: Computer System Security: Basic Concepts and Solved Exercises 3. Blanchet-Sadri, Francine: Algorithmic Combinatorics on Partial Words 4. [done S.V. Nagaraj] Boudriga, N.: Security of Mobile Communications 5. Brualdi, Richard A.: A Combinatorial Approach to Matrix Theory and Its Applications 6. Chartrand, Gary: Chromatic Graph Theory 7. Cohen, H.: Handbook of Elliptic and Hyperelliptic Curve Cryptography 8. Elaydi, Saber N.: Discrete Chaos, Second Edition: With Applications in Science and Engineering 9. [done Olivier Blazy] Elbirt, Adam J.: Understanding and Applying Cryptography and Data Security 10. Erickson, Martin: Introduction to Number Theory 11. Gross, Jonathan L.: Combinatorial Methods with Computer Applications 12. Gould, Ronald J: Mathematics in Games, Sports, and Gambling 13. [done Julia Borghoff] Hardy, Darel W.: Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition 14. Heubach, Silvia: Combinatorics of Compositions and Words 15. [done Jannik Pewny] Hinek, M. Jason: Cryptanalysis of RSA and Its Variants 16. Hsu, Lih-Hsing: Graph Theory and Interconnection Networks 17. [done Olivier Blazy] Jacobson, Douglas: Introduction to Network Security 18. Johnson, Norman: Handbook of Finite Translation Planes 19. [2009-08-18 David M'Raihi / !2010-01-31 Julia Borghoff] Joux, Antoine: Algorithmic Cryptanalysis 20. [done Cristina Onete] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols 21. [!2010-02-22 Ladan Mahabadi] Katz, Jonathan: Introduction to Modern Cryptography: Principles and Protocols 22. Kirovski, D.: Multimedia Watermarking Techniques and Applications 23. [2010-03-08 Cristina Onete] Kitsos, P.: Security in RFID and Sensor Networks 24. Koolen, Jack: Applications of Group Theory to Combinatorics 25. [done Jannik Pewny] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications 26. [? 2009-08-24 Landan Mahabadi] Lian, Shiguo: Multimedia Content Encryption: Techniques and Applications 27. Lindner, Charles C.: Design Theory, Second Edition 28. Macaulay, T.: Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies 29. Moldovyan, Nikolai: Data-driven Block Ciphers for Fast Telecommunication Systems 30. [done Francesco Sica] Mollin, Richard A.: Fundamental Number Theory with Applications, Second Edition 31. Mollin, Richard A.: Advanced Number Theory with Applications 32. [done Ken Radke] Mollin, Richard A.: Codes: The Guide to Secrecy From Ancient to Modern Times 33. Newman, Robert C.: Computer Forensics: Evidence Collection and Management 34. Paulsen, William: Abstract Algebra. An interactive Approach 35. Peeva, Irena: Syzygies and Hilbert Functions 36. Roberts, Fred: Applied Combinatorics, Second Edition 37. Sklavos, N.: Wireless Security and Cryptography: Specifications and Implementations 38. [!2010-07-31 Aka Bile Frederic Edoukou] Smith, Jonathan D. H.: Introduction to Abstract Algebra 39. available from May 2010 Stanoyevitch, A.: Introduction to Cryptography with Mathematical Foundations and Computer Implementations 40. Szabo, Sandor: Factoring Groups into Subsets 41. [2010-04-13 Vincent Immler] Talukder, Asoke K.: Architecting Secure Software Systems 42. [done Jannik Pewny] Valiente, Gabriel: Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R 43. Wallis, W.D.: Introduction to Combinatorial Designs, Second Edition 44. [done Vincent Immler] Washington, Lawrence C.: Elliptic Curves: Number Theory and Cryptography, Second Edition 45. Xiao, Y.: Security in Distributed, Grid, Mobile, and Pervasive Computing 46. Young, S.: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks 47. Zhang, Y.: Security in Wireless Mesh Networks Wiley and Sons Below you find a selection of books from Wiley and Sons. Further titles are available via Wiley and Sons' website. * [2009-12-16 Safuat Hamdy] Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition __________________________________________________________________ You may opt out of the newsletter either by editing your contact information and preferences here: https://s1.iacr.org/iacrmem/update.html Contributions are most welcome! Please include a URL and/or e-mail addresses for any item submitted (if possible). For things that are not on the Web, please submit a one-page ASCII version. Send your contributions to newsletter (at) iacr.org. Current newsletter editor is Christopher Wolf. IACR contact information: http://www.iacr.org/bod.html