[1]
K. M. Martin, Everyday Cryptography: Fundamental Principles and Applications, Second edition. Oxford: Oxford University Press, 2017.
[2]
K. M. Martin, Everyday Cryptography: Fundamental Principles and Applications, Second edition. Oxford: Oxford University Press, 2017 [Online]. Available: http://dx.doi.org/10.1093/oso/9780198788003.001.0001
[3]
F. Piper and S. Murphy, Cryptography: A Very Short Introduction, vol. Very short introductions. Oxford: Oxford University Press, 2002 [Online]. Available: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13398644790002671&institutionId=2671&customerId=2670
[4]
F. C. Piper and S. Murphy, Cryptography: A Very Short Introduction. New York: Oxford University Press, 2002.
[5]
N. Ferguson, Cryptography Engineering: Design Principles and Practical Applications. Indianapolis, IN: Wiley, 2010.
[6]
N. Ferguson, Cryptography Engineering: Design Principles and Practical Applications. Chichester: Wiley, 2012 [Online]. Available: http://rhul.eblib.com/patron/FullRecord.aspx?p=661548
[7]
S. Levy, Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. London: Penguin, 2002.
[8]
G. Corera, Intercept: The Secret History of Computers and Spies. London: Weidenfeld & Nicolson, 2015.
[9]
A. W. Dent and C. J. Mitchell, User’s Guide to Cryptography and Standards, vol. Artech House computer security series. Boston: Artech House, 2005 [Online]. Available: http://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=13399215330002671&institutionId=2671&customerId=2670
[10]
A. W. Dent and C. Mitchell, User’s Guide to Cryptography and Standards, vol. Artech House computer security series. Boston: Artech House, 2005 [Online]. Available: https://ebookcentral.proquest.com/lib/rhul/detail.action?docID=227658
[11]
H. X. Mel and D. Burnett, Cryptography Decrypted. Harlow: Addison-Wesley, 2001.
[12]
B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd ed. New York: Wiley, 1996.
[13]
S. Singh, The Code Book: The Secret History of Codes and Codebreaking. London: Fourth Estate, 2000.
[14]
D. R. Stinson, Cryptography: Theory and Practice, 3rd ed., vol. Discrete Mathematics and Its Applications. London: Chapman & Hall/CRC, 2006.