1.
Martin KM. Everyday Cryptography: Fundamental Principles and Applications. Second edition. Oxford University Press; 2017.
2.
Martin KM. Everyday Cryptography: Fundamental Principles and Applications. Second edition. Oxford University Press; 2017. http://dx.doi.org/10.1093/oso/9780198788003.001.0001
3.
Piper F, Murphy S. Cryptography: A Very Short Introduction. Vol Very short introductions. Oxford University Press; 2002. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13398644790002671&institutionId=2671&customerId=2670
4.
Piper FC, Murphy S. Cryptography: A Very Short Introduction. Oxford University Press; 2002.
5.
Ferguson N. Cryptography Engineering: Design Principles and Practical Applications. Wiley; 2010.
6.
Ferguson N. Cryptography Engineering: Design Principles and Practical Applications. Wiley; 2012. http://rhul.eblib.com/patron/FullRecord.aspx?p=661548
7.
Levy S. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. Penguin; 2002.
8.
Corera G. Intercept: The Secret History of Computers and Spies. Weidenfeld & Nicolson; 2015.
9.
Dent AW, Mitchell CJ. User’s Guide to Cryptography and Standards. Vol Artech House computer security series. Artech House; 2005. http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399215330002671&institutionId=2671&customerId=2670
10.
Dent AW, Mitchell C. User’s Guide to Cryptography and Standards. Vol Artech House computer security series. Artech House; 2005. https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=227658
11.
Mel HX, Burnett D. Cryptography Decrypted. Addison-Wesley; 2001.
12.
Schneier B. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd ed. Wiley; 1996.
13.
Singh S. The Code Book: The Secret History of Codes and Codebreaking. Fourth Estate; 2000.
14.
Stinson DR. Cryptography: Theory and Practice. Vol Discrete Mathematics and Its Applications. 3rd ed. Chapman & Hall/CRC; 2006.