Späť


Odporúčaná cudzojazyčná literatúra z oblasti kryptológie:

Historické šifry a kódy a ich lúštenie:

1.      Field Manual 34-40-2 Basic Cryptanalysis, Department of Army, GPO 1990-729/952, 13 September, 1990. (Autorom je člen ACA Walt Howe),

2.      Manual of Cryptography, British War Office, Aegean Park Press, Laguna Hills, Ca. 1989. (Reprodukcia originálneho vydania z r. 1914 - Anonym, British Army Manual of Cryptography, HMF, 1914),

3.      Course in Cryptanalysis, OP-20-G, Navy Department, Office of Chief of Naval Operations, Washington, 1941,

4.      S.I. Course in Cryptanalysis, Vol. I, June 1942, Aegean Park Press, Laguna Hills , CA. 1989,

5.      S.I. Course in Cryptanalysis, Vol. II, June 1942, Aegean Park Press, Laguna Hills , CA. 1989,  

6.      Alberti, Leon Battista, Treatise De Cifris, Meister Papstlichen, Princeton University Press, Princeton, N.J., 1963,

7.      Alexander, D.A. Secret Codes and Decoding. NY: Padell Book Co., 56 pp.

8.      Andreassen, Karl, Cryptology and the Personal Computer, with Programming in Basic, Aegean Park Press, Laguna Hills, Ca.1986,

9.      Andreassen, Karl, Computer Cryptology, Beyond Decoder Rings, Prentice-Hall 1988,

10.  Angammane, Captain. Déchiffrement de la Cryptographie Sans Instruments Du Commandant Deltheil. Paris: Henri Charles-Lavauzelle, 1900, 37 pp.

11.  Ashton, Christina, Codes and Ciphers: Hundreds of Unusual and Secret Ways to Send Messages, Cincinnati, OH:Betterway Books, 1988, 110 pp.

12.  Avinur, Michael. Ciphers. (Publikované v Izraeli). 1976, 48 pp.

13.  Bailey, J.E. Cryptography. Encyclopaedia Britannica, 9th ed., 1877, Vol. VI, 669-671.

14.  Bailly, Sharon. All About Notes: from Secret Codes and Special Inks to Fancy Folds and Dead Man’s Drops. Brookfield, CT: The Millbrook Press, 1995, 64 pp.

15.  Baker, Eugene. Secret Writing-Codes and Messages. Chicago: Children's Press, 1980, 32 pp.

16.  Capt. Baudoin, R., Éléments de cryptographie, Éditions A. Pedone, Paris, 1939

17.  Bauer, F. L.: Entzifferte Geheimnisse, Berlin: Springer-Verlag, 1995. (anglicky: Bauer, F. L.: Decrypted Secrets: Methods and Maxims of Cryptology, 2. vyd., New York, NY: Springer-Verlag, 2000. 3. vyd. 2003, 4. vyd. 2006),

18.  Bellaso, Giovanni Battista: La cifra del Sig. Giovan Battista Bel[l]aso, gentil’huomo bresciano, nuovamente da lui medesimo ridotta à gandissima brevità et perfettione. Venetia, 1553,

19.  Bellaso, Giovanni Battista: Novi et singolari modi di cifrare de l’eccellente dottore di legie Messer  Giouan Battista Bellaso nobile bresciano.  Brescia: Lodovico Britannico, 1555,

20.  Bellaso, Giovanni Battista: Il vero modo di scrivere in cifra con facilità, prestezza, et securezza di Misser Giovan Battista Bellaso, gentil’huomo bresciano. Bressa: Iacobo Britanico, 1564,

21.  Bennett, William, R. Jr., Introduction to Computer Applications for Non-Science Students, Prentice-Hall, 1976. (Obsahuje zaujímavú časť o historickej kryptografii),

22.  Biaudet, Henry: Un chiffre diplomatique du XVIe sičcle, Helsinki (Annales Academaie Fennicae, ser. B II/4)

23.  Bischoff, Bernhard: Übersicht über die nichtdiplomatischen Geheimschriften des Mittelalters, MIÖG 62(1954), s.1-27 = Mittelalterliche Studien III, Stuttgart 1981, s. 120-148

24.  Bosworth, Bruce, Codes, Ciphers and Computers: An Introduction to Information Security, Hayden Books, Rochelle Park, NJ, 1990,

25.  Capt. Bazeries, E.: Les chiffrees secrets devoiles, Paris: Libraire Charpentier et Fasquelle, 1901,

26.  Callimahos, L. D., Traffic Analysis and the Zendian Problem, Aegean Park Press, Laguna Hills, CA, 1984,

27.  Cardano, Girolamo: De subtilitate libri XXI. 1550,

28.  Cardano, Girolamo: De rerum varietate libri XVII. 1556,

29.  Clark, Ronald W.: The Man who broke Purple, Weidenfeld and Nicolson, London 1977 (česky: Muž, který odhalil Purpur, Naše vojsko, Praha, 1983),

30.  Candela, Rosario: Isomorphism and its Application in Cryptanalytics, Cardanus Press, NYC 1946,

31.  Costamagna, Giorgio: Tachigrafia notarile e scritture segrete medievali in Italia, Rom 1968

32.  Deavours, C. A. - Kruh, L.: Machine Cryptography and Modern Cryptanalysis. Norwood, MA: Artech House, Inc., 1985

33.  Deavours, C. A., Kahn, D., Kruh, L., Mellen, G. and Winkel, B.: Cryptology: Yesterday, Today, and Tomorrow. Norwood, MA: Artech House, Inc., 1987.

34.  Deavours, C. A., Kahn, D., Kruh, L., Mellen, G. and Winkel, B.: Cryptology: Machines, History, and Methods. Norwood, MA: Artech House, Inc., 1989,

35.  Deavours, C. A., Kahn, D., Kruh, L., Mellen, G. and Winkel, B.: Selections from Cryptologia: History, People, and Technology, Norwood, MA: Artech House, Inc., 1998

36.  D'agapeyeff, Alexander, Codes and Ciphers, Oxford University Press, London, 1974

37.  Delastelle, F. M.: Traite' Elementaire de Cryptographie, Mathematiques appliquees, Gauthier-Villars, Paris, 1902,

38.  Delastelle, F. M.: Cryptographie nouvelle assurant l'inviolabilite' absolue des correspondances chiffrees Maire of Saint-Malo, P. Dubreuil, Paris, 1893,

39.  Delastelle, F. M.: Cryptographie universelle, Paris, 1893,

40.  Dröscher, E.: Die Methoden der Geheimschriften (Zifferschriften) unter Berücksichtigung ihrer geschichtlichen Entwicklung, Leipzig 1921,

41.  Eyraud, Ch.: Precis de Cryptographie Moderne, Paris: Editions Raoul Tari, 1953, 308+ pp.

42.  Falconer, John (fl. 1685-1692), Cryptomenysis Patefacta; or, The Art of Secret Information Disclosed without a Key. London, Daniel Brown, 1685.

43.  Falconer, John: Cryptomenysis Patefacta and Rules for Explaning and Decyphering all Manner of Secret Writing, London, Daniel Brown, 1692,

44.  Figl, Andreas: Systeme des Chiffrierens. Mosers Buchhandlung (J. Meyerhoff), Graz 1926. XII, 243 S.

45.  Figl, Andreas: Systeme des Dechiffrierens. Unveröffentlichtes Manuskript in 3 Bänden,

46.  Fleissner v. Wostorwitz, Eduard B.: Handbuch der Kryptographie (Anleitung zum Chiffriren und Dechiffriren von Geheimschriften), Seidel&Sohn, Wien, 1881,

  1. Dettmann Alex, Fenner Wilhelm, Flicke Wilhelm, Friederichsohn Kurt, Paschke Adolph, Russian Cryptology during WW II, CA, Laguna Hills: Aegean Park Press (August 1999),
  2. Flicke, Wilhelm F. (NSA - 1959), Kriegsgeheimnisse im Äther, 1945-46?,
  3. Flicke, Wilhelm F., War Secrets of the Ether. The Use of Signals Intelligence by the German Military in WWII, SRH - Special Research History, [SRH-002, 305 pp.] (Prehľad nemeckej a európskej kryptologickej histórie 1908-1945)

50.  Flicke, Wilhelm F., War Secrets in the Ether, Laguna Hills: Aegean Park Press, 1977, vol. I, parts 1 & 2,

51.  Flicke, Wilhelm F., War Secrets in the Ether, Laguna Hills: Aegean Park Press, 1994, vol. II,

52.  Foster, C. C., Cryptanalysis for Microcomputers, Hayden Books, Rochelle Park, NJ, 1990,

53.  Friedman, William F., The Classic Elements of Cryptanalysis, Aegean Park Press, Laguna Hills, CA, 1976,

54.  Friedman, William F., Advanced Military Cryptography, Aegean Park Press, Laguna Hills, CA, 1976,

55.  Friedman, William F., Elementary Military Cryptography, Aegean Park Press, Laguna Hills, CA, 1976,

56.  Friedman, William F., Cryptography and Cryptanalysis Articles, Aegean Park Press, Laguna Hills, CA, 1976,

57.  Friedman, William F. - Mendelsohn, Charles J.: The Zimmerman Telegram of January 16, 1917 and its Cryptographic Background, Aegean Park Press, Laguna Hills, CA, 1976,

58.  Friedman, William F., History of the Use of Codes, Aegean Park Press, Laguna Hills, CA, 1977,

59.  Friedman, William F.: The Riverbank Publications - Vol. 1, Aegean Park Press, Laguna Hills, CA, 1979,

60.  Friedman, William F.: The Riverbank Publications - Vol. 2, Aegean Park Press, Laguna Hills, CA, 1979,

61.  Friedman, William F.: The Riverbank Publications - Vol. 3, Aegean Park Press, Laguna Hills, CA, 1979,

62.  Friedman, William F., The Index of Coincidence and Its Applications In Cryptography, Publication no.22, The Riverbank Publications, Aegean Park Press, Laguna Hills, CA, 1979,

63.  Friedman, William F., Cryptology, The Encyclopedia Britannica, všetky vyd. od r. 1929, (Klasický článok z pera najslávnejšieho kryptoanalytika),

64.  Friedman, William F., American Army Field Codes in The American Expeditionary Forces During the First World War, USA 1939,

65.  Friedman, William F., Six Lectures On Cryptology, National Archives, SRH-004

66.  Friedman, William F.-Callimahos, Lambros D., Military Cryptanalytics Part I - Vol. 1, Aegean Park Press, Laguna Hills, CA, 1985,

67.  Friedman, William F.-Callimahos, Lambros D.: Military Cryptanalytics Part I - Vol. 2, Aegean Park Press, Laguna Hills, CA, 1985,

68.  Friedman, William F.-Callimahos, Lambros D., Military Cryptanalytics Part II - Vol. 1, Aegean Park Press, Laguna Hills, CA, 1985,

69.  Friedman, William F.-Callimahos, Lambros D., Military Cryptanalytics Part II - Vol. 2, Aegean Park Press, Laguna Hills, CA, 1985,

70.  Fouché Gaines Helen, Cryptanalysis, A Study of Ciphers and their solution, Dover Publications Inc., 1956 (prvé vydanie 1939),

71.  Gerlich, W.: Die Entzifferung von historischen Geheimschriften, Mitteilungen des Österreichischen Staatsarchivs 1948, s. 445-469,

72.  Gen. Givierge, M., Cours de cryptographie, Berger-Levrault, Paris, 1936 (anglicky: Givierge, Gen.Marcel, Course In Cryptography, Aegean Park Press, Laguna Hills, CA, 1978)

73.  Gleason, A. M.: Elementary Course In Probability For The Cryptanalyst, Aegean Park Press, Laguna Hills, CA, 1998, 166 s.

74.  de Grandpré A., Cryptographie pratique, Librairie Boyveau et Chevillet, Paris, 1905

1.      Haldane, R. A., The hidden world. London: Robert Hale & Company, 1976

2.      Hüttenhain , Erich: Die Geheimschriften des Fürstbistums Münster unter Christoph Bernhard von Galen 1650-1678, Erich Hüttenhain, Schriften der Historischen Kommission Westfalens ; 9, Münster : Aschendorff, 1974, ISSN: 0933-2502

3.      Held, Gilbert, Top Secret Data Encryption Techniques, Carmel, IN: Sams Publishing, 1993 (Vznešený názov - obmedzené využitie),

4.      Hermann, A. Introduction au Livre des Clefs, Systeme Cryptographique Complet. Paris: Librairie Scientifique, 1892, 21 pp.

5.      Higenbottam, Frank. Codes and Ciphers. London: English Universities Press, 1973, 180 pp.

6.      Hitt, P.: Manual For The Solution Of Military Ciphers, Aegean Park Press, Laguna Hills, CA, 1976,

7.      Joliet, Ch.: Les écritures secrètes dévoilées, E. Dentu éditeur, Paris, 1874,

8.      Kahn, David: The Codebreakers, NY: The Macmillan Publishing Co., 1967 (francúzsky preklad: La guerre des codes secrets, InterEditions, 1980), História šifier na 1200 stránkach. Úplný prehľad kryptografie až do 50. rokov 20. storočia.

9.      Kahn, D.: The Codebreakers, The Story of Secret Writing, Rozšírené vydanie, NY: Scribner, 1996,

10.  Kahn, D.: Kahn On Codes - Secrets of the New Cryptology, MacMillan Co., New York, 1983,

11.  Kahn, David, Seizing The Enigma: The Race to Break the German U-Boat Codes 1939-1943, Houghton Mifflin, New York, 1991,

12.  Kasiski, Major F. W. , Die Geheimschriften und die Dechiffrirkunst, Schriften der Naturforschenden Gesellschaft in Danzig, 1872,

13.  Kircher, Athanasius (1601-1680), Polygraphia Nova et Vniversalis ex Combinatoria Arte Detecta. Rome, Varese, 1663

14.  Klüber, Johann Ludwig: Kryptographik, Lehrbuch der Geheimschreibekunst… J. G. Cotta, Thübingen 1809,

15.  Kullback, S.: Statistical Methods in Cryptanalysis, Aegean Park Press, Laguna Hills, Ca. 1976,

16.  Laffin, John, Codes and Ciphers: Secret Writing Through The Ages, Abelard-Schuman, London, 1973,

17.  Langie, A.: Cryptography, Constable and Co., London, 1922 (z francúzštiny preložil J.C.H. Macbeth),

18.  Lange, A. - Soudart, E. A.: Traité de cryptographie, Librairie Félix Alcan, Paris, 1925 (anglicky: Langie, A.-. Soudart, E. A.: Treatise on Cryptography, Aegean Park Press, Laguna Hills, CA. 1991),

19.  Langie, A.: Cryptography - A Study on Secret Writings, Aegean Park Press, Laguna Hills, CA. 1989,

20.  Lewis, Frank W., Solving Cipher Problems - Cryptanalysis, Probabilities and Diagnostics, Aegean Park Press, Laguna Hills, CA, 1992,

21.  Lintz, G. D.(LEDGE): NOVICE NOTES, American Cryptogram Association, 1994 (Jeden z najlepších popisov šifier urèený pre začiatočníkov s akým som sa doposia¾ stretol, napísaný uznávaným expertom. Nielenže je vynikajúco napísaný, ľahký na pochopenie, ale taktiež je dobrým odrazovým mostíkom pre ïalšie štúdium.),

22.  Louis, N. C.: Le dictionnaire français chiffré pour correspondance secrète, Paris, 1871,

23.  Lysing, Henry, alias John Leonard Nanovic, Secret Writing, David Kemp Co., NY, 1936,

24.  Mansfield, Louis C. S., The Solution of Codes and Ciphers, Alexander Maclehose & Co., London, 1936,

25.  Marotta, Michael, E.: The Code Book - All About Unbreakable Codes and How To Use Them, Loompanics Unlimited, 1979 (Je to zle napísaná kniha. Bez patričnej autority, ale obsahujúca príklad jednej z najlepších ilustrácií sovietskej jednorázovej šifry.)

26.  Marti, Francisco De Paula(1762-1827): Poligrafía, ó Arte de Escribir en Cifra de Diferenter Modos. Madrid, Imprenta de Sancha, 1808,

27.  Meister , Aloys: Die Anfänge der modernen diplomatischen Geheimschrift : Beiträge zur Geschichte der italienischen Kryptographie des XV. Jahrhunderts, Paderborn : Schöningh Verlag, 1902

28.  Meister, Aloys: Die Geheimschrift im Dienst der Päpstlichen Kurie, Schöningh Verlag, Paderborn, 1906,

29.  Meister, Aloys: Zur Kenntnis des venetianischen Chiffrenwesens, HJb 17()319ff.

30.  Millikin, D.: Elementary Cryptography, NYU Bookstore, NY, 1943,

31.  Mnishowsky, Raphael, Sobehrd (1580-1644): Construction sive Strues Trithemiana, Prague, 1628,

32.  Myszkowski, Lt. Col. E.V.T., Cryptographie Indechiffrable, Paris, 1902, (anglicky: Indecipherable Cryptography, 1902, 42 pp.)

33.  Newton, D. E.: Encyclopedia of Cryptology, Abc-Clio, 1997, 360 s.

34.  Nichols, R. K.: The Classical Cryptography Course, Vol. I, Aegean Park Press, Laguna Hills, Ca. 1996, xii + 301 s.

35.  Nichols, R. K.: The Classical Cryptography Course, Vol. II, Aegean Park Press, Laguna Hills, Ca. 1996, xii + 400 s.

36.  Ohaver, M. E., Solving Cipher Secrets, Aegean Park Press, Laguna Hills, Ca.1989,

37.  Palatino, Giovanni Battista: Libro nvova d'imparare a scrivere ... Con vn breue et vtile trattato de le cifere, 1540,

38.  Porta, Giovanni Battista Della (1535?-1615): De Fvrtivis Literarvm Notis: vvlgo de ziferis Libri IIII. Naples, Joa. Maria Scotus, 1563,

39.  de Prasse, Maurice: De recticulis cryptographycis. Leipzig, 1799. Autor popisuje otočnú mriežku.

40.  Pratt, Fletcher: Histoire de la cryptographie, Payot, Paris, 1940 (z amerického originálu The Secret and Urgent: The Story of Codes and Ciphers, NY, Blue Ribbon Books, 1939),

41.  Pallas, Norvin: Games with Codes and Ciphers, Dover Publications, New York, 1971

42.  Rhee, Man Young: Cryptography and Secure Communications, McGraw Hill Co., NY, 1994,

43.  Richards, S. R. (ed.), Secret writing in the public records: Henry VIII – George II. London: Crown, 1974

44.  Rodriguez, Crystobal (1677?-CA. 1735): Bibliotheca Universal de la Polygraphía Español. Madrid, Antonio Marín, 1738,

45.  Gen. Sacco, L.: Manuel de cryptographie, Payot, Paris, 1951 (preklad originálu Sacco, Gen. Luigi, Manuale di Crittografia, 1. vyd., Rím, 1936, 2. vyd., 1938, tretie vyd., 1947, anglicky: Manual of Cryptography, Aegean Park Press, Laguna Hills, Ca. 1977)

46.  Schotti Gaspari, Steganographica, 1665,

47.  Selenus Gustavus, Cryptomenytices et Cryptographiae, Libri IX, 1624, anglicky: Gustavus Selenus - Nine Books of Cryptography

48.  Schumaker, W., Renaissance curiosa. John Dee's Conversations With Angels, Girolamo Cardano's Horoscope of Christ , Johannes Trithemius and Cryptography, Binghamton, New York: Center for Medieval and Early Renaissance Studies State University New York at Binghamton, 1982,

49.  Silvestri, Jacopo: Opus novum ... principibus maxime vtilissimum pro cipharis. 1526

50.  Simonetta, Sicco, Regulae ad extrahendum litteras zifferatas sine exemplo, 1474, BNF Fonds Italien 1595 ff. 441r-442r, (anglicky: A treatise, without examples, on the extracting of ciphered writings, translated by Philip Neal)

51.  Sinkov, Abraham, Elementary Cryptanalysis: A Mathematical Approach, (New Mathematical Library, No 22), The Mathematical Association of America, NYU, 1966

52.  Singh Simon, The Code Book, Fourth Estate Ltd., London, 1999, (vo francúzštine Histoire des codes secrets, Editions JC Lattčs, 1999)

53.  Smith, L. D.: Cryptography, the science of secret writing, Dover Publications Inc., 1943,

54.  Stix, Franz: Zur Geschichte und Organisation der Wiener Geheimen Ziffernkanzlei, MIÖG 51(1937)131ff.

55.  Stix, Franz: Die Geheimschriftenschlüssel der Kabinettkanzlei des Kaisers, Nachrichten v.d. Gesellschaft d. Wisenschaften zu Göttingen, Phil. hist. Klasse 1936-1939.

56.  Stix, Franz: Geheimschriftenkunde als historische Hilfswissenschaft, MIÖG Erg.-Bd. 14(1939)453ff.

57.  Terzi, Francesco Lana (1631-1687): Prodromo all'Arte Maestra. Brescia, Rizzardi, 1670,

58.  Thicknesse, Philip (1719-1792): A Treatise on the Art of Decyphering, and of Writing in Cypher. London, W. Brown, 1772,

59.  Trithemius, Johannes (1462-1516): Polygraphique et Vniverselle Escriture Cabalistique. Paris, Jacques Kerver, 1561, (latinsky: Polygraphiae libri sex, 1518)

60.  Trithemius, Johannes: Steganographia, Ars per occvltam scriptvram animi svi volvntatem absentibvs aperiendi certa. Nuremberg, Joh. Friedrich Rüdiger, 1721 (originál: buď vyd. 1531? v Lyone alebo až v r.1606)

61.  Vesin, C. F.: La cryptographie dévoilée, Librairie de Deprez-Parent, Bruxelles, 1840,

62.  Marquis de Viaris, Gaetan Henri Leon Viarizio di Lesegno, L'art de déchiffrer les dépêches secrètes, Gauthier-Villars et fils, G. Masson, Paris, 1893,

63.  Vigenère Blaise, Traicté des chiffres, ou secretes manieres d'escrire, Abel L'Angelier, 1586. Ce livre a été réédité chez Guy Trédaniel éditeur, Paris, 1996,

64.  Volt, James D.: Bibliography of cryptography, s. l. 1938. Súpis je neúplný a nie je celkom presný.

65.  de Vries, M. Quantizing in Language and Cryptanalysis. 23 pp. (článok v holandštine: Kvantificering in taal en Crypto-analyse)

66.  de Vries, M. Concealment of Information. Synthese, vol. IX, 1953, pp. 326-336,

67.  Wagner, F.: Studien zu einer Lehre von der Geheimschrift (Chifferkunde), Archivalische Zeitschrift Bd. 11-13, 1886-1888.

68.  Wandruszka, Adam: Die "Geheimstenographie" Leopolds II. In: Fs. Wilhelm Treue, München 1969, S. 64ff.

69.  Wolfe, Ramond W.: Secret Writing, McGraw Hill Books, NY, 1970,

70.  Wolfe, Jack M.: A First Course in Cryptanalysis, Brooklin College Press, NY, 1943,

71.  Wrixon, Fred B.: Codes, Ciphers and Secret Languages, Crown Publishers, New York, 1990,

72.  Wrixon, F. B., Codes and Ciphers. New York, New York: Prentice Hall, 1992,

73.  Wrixton, F. B.: Codes, Ciphers and Other Cryptic and Cladestine Communication: Making and breaking Secret Messages from Hieroglyphs to the Internet, Black Dog and Levanthal, 1998 (francúzsky: Langages secrets. Codes, chiffres et autres cryptosystčmes, Könemann, 2000),

74.  Yardley, Herbert O., The American Black Chamber, Bobbs-Merrill, NY, 1931

75.  Yardley, H. O., The Chinese Black Chamber, Houghton Mifflin, Boston, 1983.

76.  Yardley, H. O., Yardleygrams, Bobbs-Merrill, NY, 1932,

77.  Zim, Herbert S.: Codes and Secret Writing. William Morrow Co., New York, 1948.

Moderné šifrovacie systémy a ich hodnotenie bezpečnosti:

1.      Beker, H.-Piper, F.: Cipher Systems, The Protection of Communications, New York, NY: John Wiley & Sons, 1982,

2.      Beutelspacher, A.: Cryptology (Spectrum Series), Washington: Mathematical Association of America, 1994

3.      Brassard, G.: Modern Cryptology: a Tutorial, NY: Spinger-Verlag, 1988

4.      Churchhouse, R., Codes and ciphers: Julius Caesar, the Enigma, and the internet. Cambridge: Cambridge University Press, 2002

5.      Cusick, T. W.-Ding, C.- Renvall, A.: Stream Ciphers and Number Theory, London, Elsevier Science, 1998

6.      Davies, D. W.-Price, W. L.: Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd edition, New York, NY: John Wiley & Sons, 1989,

7.      Denning, D. E. R.: Cryptography and Data Security. Reading, MA: Addison-Wesley, 1981,

8.      Garfinkel, Simson, PGP: Pretty Good Privacy, O'Reilly and Associates, Inc. Sebastopol, CA. 1995,

9.      Garrett, Paul. Making, Breaking Codes: An Introduction to Cryptology. NJ: Prentice-Hall, Inc. 2000, 524 pp.

10.  Held, Gilbert. Learn Encryption Techniques with BASIC and C++. Plano, TX: Wordware Pub., 1999, 401 pp. plus CD-ROM.

11.  Koblitz, N.: A Course in Number Theory and Cryptography. 2nd Edition, New York, NY: Springer-Verlag, 1994

12.  Konheim, A. G.: Cryptography, A Primer. New York, NY: John Wiley & Sons, 1981,

13.  Konheim, A. G.: Computer Security and Cryptography. NY: Wiley-Interscience, John Wiley & Sons, 2007,  

14.  Lewand Robert Edward , Cryptological Mathematics, published by The Mathematical Association of America, 2000,

15.  Kranakis, E.: Primality and Cryptography. Chichester/New York: John Wiley & Sons, 1986

16.  Mel, H. X.-Baker, D.: Cryptography decrypted, Reading, MA: Addison-Wesley, 2000,

17.  Menezes, A. J.: Elliptic Curve Public Key Cryptosystems. Boston, MA: Kluwer Academic Publishers, 1993.

18.  Menezes, A. J., van Oorschot, P.,Vanstone, S.: Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1997,

19.  Merkle, Ralph, Secrecy, Authentication and Public Key Systems, Ann Arbor, UMI Research Press, 1982,

20.  Meyer, C. H. -Matyas, S. M.: Cryptography: A New Dimension in Computer Data Security. New York, NY: John Wiley & Sons, 1982,

21.  Patterson, W.: Mathematical Cryptology for Computer Scientists and Mathematicians. Totowa, NJ: Rowman and Littlefield, 1987,

22.  Rivest, Ronald: Cryptology, In: Handbook of Theoretical Computer Science, Kap. 13, 1988,

23.  Rueppel, R.: Analysis and Design of Stream Ciphers, NY, Springer Verlag, 1986

24.  Salomaa, A.: Public-Key Cryptography. New York, NY: Springer-Verlag, 1990.

25.  Schneier, B.: Applied Cryptography. 2nd Edition, New York, NY: John Wiley & Sons, 1996

26.  Seberry, J. - Pieprzyk, J.: Cryptography: An Introduction to Computer Security. New York, NY: Prentice-Hall, 1989 (OPATRNE! Obsahuje množsvo chýb - Nie je vhodná pre začiatočníkov - Napr. pozri Dodatok A, str. 307)

27.  Simmons, G. J.(Editor): Contemporary Cryptology: The Science of Information Integrity. New York, NY: IEEE Press, 1992.

28.  Stinson, D. R.: Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 1995, 2. vyd., 2002, (francúzsky: Cryptographie - Théorie et pratique, Vuibert Informatique, Paris, 2001),

29.  van Tilborg, H. C. A.: An Introduction to Cryptology. Boston, MA: Kluwer Academic Publishers, 1988.

30.  Welsh, D.: Codes and Cryptography. Oxford, London: Oxford University Press, 1988


Späť