[HGI-news-int] Book Reviews in Crypto and IT-Security

English Newsletter of the Horst Gö rtz Institute of IT Security in Bochum hgi-news-international at lists.ruhr-uni-bochum.de
Mon Nov 2 20:09:46 CET 2009


Dear all,

the first 6 reviews in the IACR book reviewing system are now online,
see http://www.iacr.org/books/ You may find them helpful if you think
about buying a book in this area.
Thanks a lot to all who have participated with their reviews!

Below you find an ASCII extract of the reviews.

Best regards,
Christopher

======================

    * Carlos Cid, Sean Murphy, and Matthew Robshaw: "Algebraic Aspects
of the Advanced Encryption Standard", 2006:
      In their book the authors give an algebraic perspective of the
Advanced Encryption Standard (AES). The way the book is written is
overall pleasant. The reader who is ok with mathematical language should
have no problem reading it. The material is not overwhelmed with heavy
mathematical results/proofs/notions. Considering that the book contains
also necessary mathematical background overview, it is readable for
engineers and cryptographers without a particular pre-knowledge of algebra.
      Review written by Stanislav Bulygin (CASED - Center for Advanced
Security Research Darmstadt, Germany).
      Publisher: Springer.

    * Song Y. Yan: "Cryptanalytic Attacks on RSA", 2008:
      The book is the state of the art encyclopaedia of RSA encryption
algorithm. It is well-structured and can be used as lecture notes for
any university cryptographic course or student research project.It is
the most relevant and self-explanatory book about RSA and is very
helpful for students and teachers.
      Review written by Yuriy R. Aydarov (Perm State University,
Russia). Publisher: Springer.

    * Adam J. Elbirt: "Understanding and Applying Cryptography and Data
Security", 2009:
      And now how do I implement that? If you have some day wondered how
to implement your cryptographic result, this book is here to help you...
>From symmetric-key to public-key cryptography, from signatures to MAC,
you'll may find the answer you are looking for in there.
      Review written by Olivier Blazy (Ecole Normale Supérieure, Paris,
France). Publisher: Taylor & Francis Group.

    * Karl de Leeuw and Jan Bergstra (editors): "The History of
Information Security - A Comprehensive Handbook", 2007:
      This magisterial book, of almost 900 pages, has joined Kahn,
Yardley and Welchmann on my shelf of serious reference works. Yet it
contains much that I found new, surprising and even delightful, despite
a quarter century of working in the field.
      Review written by Ross Anderson (University of Cambridge, Computer
Laboratory). Publisher: Elsevier.

    * Shiguo Lian: "Multimedia Content Encryption: Techniques and
Applications", 2009:
      This book gives a good starting point for research concerning the
special requirements multimedia content has of cryptography. It takes
various types of encryption, compression, watermarking and
fingerprinting into account. Readers with background in cryptography and
interest in the topic of multimedia encryption should be satisfied.
      Review written by Jannik Pewny (Horst Görtz Institute, Ruhr
University Bochum, Germany). Publisher: CRC Press, Taylor & Francis Group.

    * Gabriel Valiente: "Combinatorial Pattern Matching Algorithms in
Computational Biology using Perl and R", 2009:
      The book holds what its cover promises: It is a well-sorted
collection of pattern matching algorithms that are used to work with
problems in computational biology. Only shortcoming is the missing
runtime-analysis. All in all, it is recommended, in particular for
students of computational biology or bioinformatics.
      Review written by Jannik Pewny (Horst Görtz Institute, Ruhr
University Bochum, Germany). Publisher: CRC Press, Taylor & Francis Group.





More information about the HGI-News-International mailing list