Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An introduction to mathematical cryptography (2nd ed.)
Hoffstein J., Pipher J., Silverman J., Springer Publishing Company, Incorporated, New York, NY, 2014. 538 pp. Type: Book (978-1-493917-10-5)
Date Reviewed: Mar 10 2015

In a 2009 review of the first edition of this book [1], reviewer Burkhard Englert wrote: “As an undergraduate mathematical textbook, the book is excellent from start to finish. The authors don’t just run from proof to proof; they also take the time to explain the historical background of famous techniques and algorithms.” The same can be said about the second edition: excellent from start to finish. Mathematical cryptography texts often seem to focus on interesting mathematics that just happens to be used in cryptography. In contrast, this book explains the mathematical foundations of public key cryptography in a mathematically correct and thorough way without omitting important practicalities. In addition to the usual changes linked to a new edition (correction of errors, improvements in exposition, rearrangement of topics), two new short sections were added in the final chapter on digital cash and bitcoin, and homomorphic encryption. The sections are intended to provide a quick introduction to topics that could not be developed in more detail in the main text.

The authors state in the preface: “This book provides a self-contained course for the beginning student. The only prerequisite is a first course in linear algebra.” Indeed, the book covers a lot of background material, but is perhaps not as broad and gentle as an introductory textbook on abstract algebra and number theory. Also, due to the somewhat narrow focus on public-key cryptography (Diffie-Hellman key exchange, ElGamal encryption, RSA encryption, elliptic curve cryptography, and NTRU encryption), this book may not be the perfect choice as a single text for an undergraduate cryptography course. It should at least be supplemented by a text on classical cryptography (for example, [2]).

That being said, I would like to emphasize that the book is very well written and quite clear. Topics are well motivated, and there are a good number of examples and nicely chosen exercises. To me, this book is still the first-choice introduction to public-key cryptography.

More reviews about this item: Amazon

Reviewer:  Klaus Galensa Review #: CR143231 (1506-0446)
1) Englert, B. Review of An introduction to mathematical cryptography, by J. Hoffstein et al. Computing Reviews (Mar. 18, 2009), CR Rev. No. 136598 (1003-0226).
2) Stanoyevitch, A. Introduction to cryptography with mathematical foundations and computer implementations. CRC, Boca Raton, FL, 2010.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy