Hardware Reference

In-Depth Information

Finding additional cryptography resources

The projects in this topic all use some sort of cryptography. If you are familiar with terms

such as asymmetric cryptography, digital signatures, and message authentication codes,

then you should be OK. If not, you will still be able to complete the projects but you may

not appreciate the theory behind them.

As this is not a topic on cryptography, a primer here will not provide enough detail for a

beginner and will be woefully inadequate for someone familiar with the material. If crypto-

graphy is new to you, you can still proceed with the topic. In the beginning of each chapter,

there is some tailored background to explain the material, which should be enough for you

to understand what the project is trying to accomplish. Once complete, hopefully, you'll be

interested in cryptography and you can get more information from the following resources.

For a gentle introduction to the topic,
Cryptography: A Very Short Introduction
by
Fred

Piper and Sean Murphy
,
Oxford University Press
,
2002
, is good starting point. However,

as the title suggests, it lacks technical depth.
Understanding Cryptography: A Textbook for

Students and Practitioners
by
Christof Paar et. al.
,
Springer, 2010
, is a more detailed in-

troduction. For the more inquisitive readers,
Introduction to Modern Cryptography
by

Jonathan Katz and Yehuda Lindell
,
Chapman and Hall/CRC
,
2007
, is a good up-to-date

reference.

If lectures better suit you, you are in luck. Khan Academy has some interesting and free

mini-lectures covering ancient cryptography up to RSA (
https://www.khanacademy.org/

computing/computer-science/cryptography
). Another free resource is Coursera, which has

three cryptography classes,
Cryptography I and II
taught by Standford Professor Dan

Boneh, and a Cryptography class on modern cryptography taught by Jonathan Katz. The

links for these classes are
https://www.coursera.org/course/crypto
,
ht-

respectively.