@book{Corera_2015, address={London}, title={Intercept: The Secret History of Computers and Spies}, publisher={Weidenfeld & Nicolson}, author={Corera, Gordon}, year={2015} }
@book{Dent_Mitchell_2005a, address={Boston}, title={User’s Guide to Cryptography and Standards}, volume={Artech House computer security series}, url={https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=227658}, publisher={Artech House}, author={Dent, Alexander W. and Mitchell, Chris}, year={2005} }
@book{Dent_Mitchell_2005b, address={Boston}, title={User’s Guide to Cryptography and Standards}, volume={Artech House computer security series}, url={http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399215330002671&institutionId=2671&customerId=2670}, publisher={Artech House}, author={Dent, Alexander W. and Mitchell, Chris J.}, year={2005} }
@book{Ferguson_2010, address={Indianapolis, IN}, title={Cryptography Engineering: Design Principles and Practical Applications}, publisher={Wiley}, author={Ferguson, Niels}, year={2010} }
@book{Ferguson_2012, address={Chichester}, title={Cryptography Engineering: Design Principles and Practical Applications}, url={http://rhul.eblib.com/patron/FullRecord.aspx?p=661548}, publisher={Wiley}, author={Ferguson, Niels}, year={2012} }
@book{Levy_2002, address={London}, title={Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age}, publisher={Penguin}, author={Levy, Steven}, year={2002} }
@book{Martin_2017a, address={Oxford}, edition={Second edition}, title={Everyday Cryptography: Fundamental Principles and Applications}, publisher={Oxford University Press}, author={Martin, Keith M.}, year={2017} }
@book{Martin_2017b, address={Oxford}, edition={Second edition}, title={Everyday Cryptography: Fundamental Principles and Applications}, url={http://dx.doi.org/10.1093/oso/9780198788003.001.0001}, publisher={Oxford University Press}, author={Martin, Keith M.}, year={2017} }
@book{Mel_Burnett_2001, address={Harlow}, title={Cryptography Decrypted}, publisher={Addison-Wesley}, author={Mel, H. X. and Burnett, Doris}, year={2001} }
@book{Piper_Murphy_2002a, address={New York}, title={Cryptography: A Very Short Introduction}, publisher={Oxford University Press}, author={Piper, F. C. and Murphy, Sean}, year={2002} }
@book{Piper_Murphy_2002b, address={Oxford}, title={Cryptography: A Very Short Introduction}, volume={Very short introductions}, url={http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13398644790002671&institutionId=2671&customerId=2670}, publisher={Oxford University Press}, author={Piper, Fred and Murphy, Sean}, year={2002} }
@book{Schneier_1996, address={New York}, edition={2nd ed}, title={Applied Cryptography: Protocols, Algorithms and Source Code in C}, publisher={Wiley}, author={Schneier, Bruce}, year={1996} }
@book{Singh_2000, address={London}, title={The Code Book: The Secret History of Codes and Codebreaking}, publisher={Fourth Estate}, author={Singh, Simon}, year={2000} }
@book{Stinson_2006, address={London}, edition={3rd ed}, title={Cryptography: Theory and Practice}, volume={Discrete Mathematics and Its Applications}, publisher={Chapman & Hall/CRC}, author={Stinson, Douglas R.}, year={2006} }