EE627 Introduction to Cryptography and Secure Communication

References


August 16, 2006 (this list will be updated throughout the term)

The following is a list of textbooks, articles, and other books on cryptography, secure communications, and related topics.


BOOKS:

H. Beker and F. Piper, Cipher Systems, Northwood, 1982.

B. Bosworth, Codes, Ciphers and Computers, Hayden, 1982.

Crytography's Role in Securing the Information Age, National Academy Press, 1996.

D.E.R. Denning, Cryptography and Data Security, Addison-Wesley, 1982.

H.F. Gaines, Cryptanalysis: A Study of Ciphers and Their Solutions, Dover, 1956.

R.F. Graf and W. Sheets, Video Scrambling and Descrambling, Sams, 1987.

E. Kranakis, Primality and Cryptography, Wiley, 1986.

N. Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, 1987.

A.G. Konheim, Cryptography: A Primer, John Wiley, 1981.

W. Patterson, Mathematical Cryptology, Rowman and Littlefield, 1987.

R.A. Reuppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.

J. Seberry and J. Pieprzyk, Cryptography: An Introduction to Computer Security, Prentice-Hall, 1989.

H.C.A. van Tilborg, An Introduction to Cryptology, Kluwer, 1988.

P. Way, Codes and Ciphers, Crescent Books, 1977.

D. Welsh, Codes and Cryptography, Oxford Science Publications, 1988.

F. B. Wrixson, Codes, Ciphers, and Secret Languages, Bonanza, 1989.

D. R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.

G. J. Simmons (editor), Contemporary Cryptology, IEEE Press, 1992.

B. Schneier, Applied Cryptography, Wiley, 1994.

M. Y. Rhee, Cryptography and Secure Communications, McGraw-Hill, 1994.

S. Garfinkel, PGP: Pretty Good Privacy, O'Reilly, 1995.


MULTIMEDIA SYSTEMS:

Ray Wolfgang and E. J. Delp, "A Watermark for Digital Images," Proceedings of the IEEE International Conference on Image Processing, September 16-19, 1996, Lausanne, Switzerland.

F.M. Boland, J.J.K. O Ruanaidh, B. Macq, "Watermarking Digital Images for Copyrigt Protection," Proceedings of the IEEE International Conference on Image Processing, July 1995, Washington.

William J. Mitchell. "When is seeing believing ?," Scientific American, February, 1994. pp. 68 - 73.

Benoit M. Macq and Jean-Jacques Quisquater, "Cryptology for digital TV broadcasting," Proceedings of the IEEE, vol. 83, no. 6, June 1995, pp. 944-957.

Stuart Haber and W. S. Stornetta, "How to time stamp a digital document," Advances in Cryptology - CRYPTO '90 Proceedings, Springer-Verlag, 1991, pp. 437-455.

Steve Walton, "Information authentication for a slippery new age," Dr. Dobbs Journal, vol. 20, no. 4, pp. 18-26, April, 1995.

R. G. van Schyndel, A.Z.Tirkel, N.R.A Mee, C.F. Osborne, "A digital watermark," Proceedings of the IEEE International Conference on Image Processing, November, 1994, Austin, Texas vol. 2, pp. 86- 90.

J.-F. Delaigle, C. De Vleeschouwer, B. Macq, "Digital Watermarking," accepted for publication in the Journal of Electronic Imaging.

Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon, "Secure spread spectrum watermarking for multimedia," Technical Report 95-10, NEC Research Institute, Princeton, NJ.

Fred Mintzer, Albert Cazes, Francis Giordano, Jack Lee, Karen Magerlein and Fabio Schiattarella, "Capturing and preparing images of Vatican library manuscripts for access via internet," Proceedings of the IS&T 48th Annual Conference, May, 1995, Washington, DC, USA, pp. 74 - 77.

U.-C. G. Fiebig and M. Schnell, "Correlation properties of extended m-sequences," Electronics Letters, vol. 29, no. 20. pp. 1753-1755. September 30, 1993.

R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne, "Towards a robust digital watermark," Proceedings of the ACCV-95 Conference, December 5-8, 1995, Nanyang Technological University, Singapore.

F. Jessie Mac Williams and Neil J. A. Sloane, "Pseudorandom sequences and arrays," Proceedings of the IEEE, vol. 64, no. 12, pp. 1715-1729, December 1976.

Solomon W. Golomb and Herbert Taylor, "Construction and properties of costas arrays," Proceedings of the IEEE, vol. 72, no. 9, pp. 1143-1163, September, 1984.

Tuvi Etzion, "Constructions for perfect maps and pseudorandom arrays," IEEE Transactions on Information Theory, vol. 34, no. 5, pp. 1308-1316, September, 1988.

Solomon W. Golomb and Herbert Taylor, "Two- dimensional synchronization patterns for minimum ambiguity," IEEE Transactions on Information Theory, vol. 28, no. 4, pp. 600-604, July, 1982.


JOURNAL ARTICLES:

C.R. Abbruscato, "Data Encryption Equipment," IEEE Communications Society Magazine, September 1984, pp. 15-21.

D. Andelman and J. Reeds, "On the Cryptanalysis of Rotor Machines and Substitution - Permutation Networks," IEEE Transactions on Information Theory, Vol. IT-28, No. 4, July 1982, pp. 578-584.

C.M. Campbell, "Design and Specification of Cryptographic Capabilities," IEEE Communications Society Magazine, November 1978, pp. 15-19.

D. Chaum, "Security Without Identification: Transaction Systems to make Big Brother Obsolete," Communications of the ACM, Vol. 28, No. 10, October 1985, pp. 1030-1044.

D.W. Davies, "Applying the RSA Digital Signature to Electronic Mail," IEEE Computer, February 1983, pp. 55-62.

R.M. Davis, "The Data Encryption Standard in Perspective," IEEE Communications Society Magazine, November 1978, pp. 5-9.

P.J. Denning, "Security of Data in Networks," American Scientist, Vol. 75, January 1987, pp. 12-14.

P.J. Denning, "Baffling Big Bother," American Scientist, Vol. 75, September 1987, pp. 464-466.

Y.G. Desmedt, J.P. Vandewalle, and R.J.M. Govaerts, "A Critical Analysis of the Security of Knapsack Public-Key Algorithms," IEEE Transactions on Information Theory, Vol. 30, No. 4, July 1984, pp. 601-611.

W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, Vol. 22, No. 6, November 1976, pp. 644-654.

W. Diffie and M.E. Hellman, "Privacy and Authentication: An Introduction to Cryptography," Proceedings of the IEEE, Vol. 67, No. 3, March 1979, pp. 397-427.

D. Doler and A.C. Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, Vol. IT-29, No. 2, March 1983, pp. 198-208.

T. Elgamal, "A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory, Vol. IT-31, No. 4, July 1985, pp. 469-472.

M.E. Hellman, "An Extension of the Shannon Theory Approach to Cryptography," IEEE Transactions on Information Theory, Vol. 23, May 1977, pp. 289-294.

M.E. Hellman, "A Cryptanalytic Time-Memory Trade-Off," IEEE Transactions on Information Theory, Vol. IT-26, No. 4, July 1980, pp. 401-406.

M.E. Hellman, "The Mathematics of Public-Key Cryptography," Scientific American, August 1979, pp. 146-157.

R.C. Merkle and M.E. Hellman, "Hiding Information and Signatures in Trapdoor Knapsacks," IEEE Transactions on Information Theory, Vol. 24, No. 5, September 1975, pp. 525-530.

T. Miller, "The Data-Base Revolution," Columbia Journalism Review, September 1988, pp. 35-38.

R. Morris, "The Data Encryption Standard - Retrospective and Prospects," IEEE Communications Society Magazine, November 1978, pp. 11-14.

A.M. Odlyzko, "Cryptanalytic Attacks on the Multiplicative Knapsack Cryptosystem and on Shamir's Fast Signature Scheme," IEEE Transactions on Information Theory, Vol. 30, No. 4, July 1984, pp. 594-601.

T. Okamoto, "A Fast Signature Scheme Based on Congruential Polynomial Operations," IEEE Transactions on Information Theory, Vol. 36, No. 1, January 1990, pp. 47-53.

A. Sgarro, "Error Probabilities for Simple Substitution Ciphers," IEEE Transactions on Information Theory, Vol. IT-29, No. 2, March 1983, pp. 190-198.

A. Shamir and R.E. Zippel, "On the Security of the Merkle-Hellman Cryptographic System," IEEE Transactions on Information Theory, Vol. 26, No. 3, May 1980, pp. 339-340.

A. Shamir, "A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," IEEE Transactions on Information Theory, Vol. 30, No. 5, September 1984, pp. 699-704.

C.E. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, Vol. 28, October 1949, pp. 656-715.

"What Price Privacy," Consumer Reports, May 1991, pp. 356-360.

The entire November 1978 issue of the IEEE Communications Society Magazine is devoted to cryptography.


OTHER:

T.B. Allen, War Games, McGraw-Hill, 1987.

J. Bamford, The Puzzle Palace, Houghton Mifflin, 1982.

B. Bloombecker, Spectacular Computer Crimes, Dow Jones-Irwin, 1990.

P. Bracken, The Command and Control of Nuclear Forces, Yale University Press, 1983.

D. Burnham, The Rise of the Computer State, Random House, 1984.

D. Burnham, A Law Unto Itself: Power, Politics and the IRS, Random House, 1989.

D. A. Curry, UNIX System Security, Addison-Wesley, 1992.

P.J. Denning (editor), Computers Under Attack, Addison-Wesley, 1990.

J. Van Duyn, Automated Crime Information Systems, TAB, 1991.

J.W. Eaton, Card-Carrying Americans: Privacy, Security and the National ID Card Debate, Rowman and Littlefield, 1986.

Electronic Record Systems and Individual Privacy, U.S. Congress, Office of Technology Assessment, 1986.

S. Garfinkel and G. Spafford, Practical UNIX Security, O'Reilly and Associates, 1991.

B. Garson, The Electronic Sweatshop, Simon and Schuster, 1988.

M.H. Halperin and D. Hoffman, Freedom vs. National Security: Secrecy and Surveillance, Chelsea House, 1977.

Health Data in the Information Age, National Academy, 1994.

L.J. Hoffman (editor), Rogue Programs: Viruses, Worms, and Trojan Horses, Van Nostrand Reinhold, 1990.

P.B. Janeczko, Loads of Codes and Secret Ciphers, MacMillan, 1984.

K.C. Laudon, Dossier Society: Value Choices in the Design of National Information Systems.

A.R. Miller, The Assault on Privacy: Computers, Data Banks, and Dossiers, University of Michigan Press, 1971.

A. Neier, Dossier: The Secret Files They Keep on You, Stein and Day, 1975.

B.J. O'Keefe, Trapdoor, Houghton Mifflin, 1988.

D.B. Parker, Fighting Computer Crime, Scribner, 1983.

Personal Privacy in an Information Society: The Report of the Privacy Protection Study Commission, U.S. Government Printing Office, 1977.

D. Russell and T. G. Gangemi, Computer Security Basics, O'Reilly and Associates, 1991.

Security and Privacy, Vol. I and II, IEEE Computer Society Press, 1990.

N. J. A. Sloane and A. D. Wyner, Claude Shannon: Collected Papers, IEEE Press, 1993.

R.E. Smith, Privacy: How to Protect What's Left of It," Anchor Press/Doubleday, 1979.

C. Stoll, The Cuckoo's Egg, Doubleday, 1989.

F.W. Winterbotham, The Ultra Secret, Harper and Row, 1974.

A. Lundel, Virus:The Secret World of The Computer Invaders That Breed and Destroy, Contemporary Books, 1989.

I. C. Palmer and G. A. Potter, Computer Security Risk Management, Van Nostrand, 1989.

S. J. Brams and D. M. Kilgour, Game Theory and National Security, Blackwell, 1988.


Professor Edward J. Delp