C. P. Bauer:
Secret History. The Story of Cryptology, CRC Press, Boca Raton, 2013.
F. L. Bauer: Decrypted Secrets. Methods and Maxims of Cryptology, Springer-Verlag,
Berlin, 2000.
B. Beckett: Introduction to Cryptology,
Blackwell, Oxford, 1988.
B. Beckman: Codebreakers: Arne Beurling and the Swedish crypto program during World War II,
American Mathematical Society, 2002.
H. Beker, F. Piper: Cipher Systemns. The Protection of Communications, Northwood Books, London, 1982.
D. J. Bernstein, J. Buchmann, E. Dahmen (Eds.): Post Quantum Cryptography,
Springer, 2009.
A. Beutelspacher: Kryptologie,
Vieweg, Braunschweig, 1987.
A. K. Bhandari, D. D. Nagraj, R. Ramakrishnan, T.N. Venkataramana (Eds.): Elliptic
Curves, Modular Forms and Cryptography,
Hindustan Book Agency, New Delhi, 2003.
E. Biham, A. Shamir: Differential Cryptanalysis of the
Data Encryption Standard, Springer-Verlag, New York, 1993.
I. Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography, Cambridge University Press,
Cambridge, 1999.
I. Blake, G. Seroussi, N. Smart (Eds): Advances in Elliptic Curve Cryptography,
Cambridge University Press, Cambridge, 2005.
B. Ibrahimpašić: Matematičke osnove kriptografije javnog ključa,
magistarski rad, Univerzitet u Sarajevu, 2004.
B. Ibrahimpašić: RSA
kriptosustav, Osječki matematički list 5 (2005), 101-112.
B. Ibrahimpašić: Metode faktorizacije,
Matematičko-fizički list 56 (2005-2006), no. 4, 233-239.
B. Ibrahimpašić: Primjena verižnih razlomaka u diofantskim aproksimacijama i kriptoanalizi,
doktorska disertacija, Sveučilište u Zagrebu, 2008.
B. Ibrahimpašić: Kriptografija kroz primjere, Pedagoški fakultet Bihać, 2011.
M. J. Jacobson, H.C. Williams: Solving the Pell Equation, Springer, 2009.
A. Joux: Algorithmic Cryptanalysis, CRC Press, Boca Raton, 2009.
D. Joyner (Ed.):
Coding Theory and Cryptography. From Enigma and
Geheimschreiber to Quantum Theory, Springer-Verlag, Berlin, 2000.
A. Jurasić, M. Rukavina, Pseudoprosti brojevi,
Matematičko-fizički list 62 (2011-2012), no. 1, 20-25.
D. Kahn: The Codebreakers. The Story of Secret Writing,
Scribner, New York, 1996.
(hrvatski prijevod: Šifranti protiv špijuna,
Centar za informacije i publicitet, Zagreb, 1979)
V. Kapitanović: Povijesna vrela i pomoćne znanosti,
Filozofski fakultet, Split, 2012.
M. Matsui, Linear Cryptanalysis Method for DES Cipher,
in: Advances in Cryptology -- EUROCRYPT ’93,
Lecture Notes in Comput. Sci., 965 (1993), 386–397.
C. Paar, J. Pelzl: Understanding Cryptography. A Textbook for Students and Practitioners,
Springer, Berlin, 2010.
W. Patterson: Mathematical Cryptology for
Computer Scientists and Mathematicians, Rowman & Littlefield,
Totowa, 1987.
A. Pethö: Algebraische Algorithmen, Vieweg, Braunschweig, 1999.
F. Piper, S. Murphy, Cryptography: A Very Short Introduction, Oxford University Press, Oxford, 2002.
D. Pleskonjić, N. Maček, B. Đorđević, M. Carić, Sigurnost računarskih sistema i mreža,
Mikro knjiga, Beograd, 2007.
C. Pomerance (Ed.): Cryptology and Computational Number Theory,
Proceedings of Symposia in Applied Mathematics, Vol. 42, American
Mathematical Society, Providence, 1990.
H. Riesel, Prime Numbers and Computer Methods for Factorization,
Birkhäuser, Boston, 1994.
A. Rosen: Concurrent zero-knowledge,
Springer, 2006.
K. H. Rosen: Elementary Number Theory and Its Applications,
Addison-Wesley, Reading, 1993.
M. Rosing: Implementing Elliptic Curve Cryptography,
Manning, Greenwich, 1999.
J. Rothe: Complexity Theory and Cryptography. An Introduction to Cryptocomplexity,
Springer, Berlin, 2005.
B. Schneier: Applied Cryptography,
John Wiley, New York, 1995.
M. R. Schroeder: Number Theory in Science and
Communication, Springer-Verlag, Berlin, 1997.
T. R. Shemanske: Modern Cryptography and Elliptic Curves: A Beginner’s Guide,
American Mathematical Society, Providence, 2017.
M. H. Sherif: Protocols for Secure Electronic Commerce,
CRC Press, Boca Raton, 2000.
I. E. Shparlinski: Finite Fields. Theory and Computation.
The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography, Kluwer, 1999.
I. E. Shparlinski: Cryptographic Applications of Analytic Number Theory,
Birkhauser, Basel, 2003.
G. J. Simmons (Ed.): Contemporary Cryptology,
The Science of Information Integrity,
IEEE Press, Piscataway, 1992.
S. Singh:
The Code Book, Fourth Estate, London, 1999.
(hrvatski prijevod: Šifre. Kratka povijest kriptografije,
Mozaik knjiga, Zagreb, 2003)
A. Sinkov: Elementary Cryptanalysis. A Mathematical Approach,
The Mathematical Association of America, Washington, 1966.
Ako Ă„ĂË€šĂËÂÄ‚Ë‚¬ĹľÄ‚ĂË€žĂËÂÄ‚Ë‚¬Â¦Ă„ĂË€šĂËÂÄ‚Ë‚¬ĹľÄ‚ĂË€žĂ„Äľelite spremiti trajne postavke, kliknite Spremi, ako ne - vaĂ„ĂË€šĂËÂÄ‚Ë‚¬ĹľÄ‚ĂË€žĂËÂÄ‚Ë‚¬Â¦Ă„ĂË€šĂËÂÄ‚Ë‚¬Ä…Ä‚ËÂÂÄ‚ËÂÄ‚Ë€šÂ¬Ă‹ĂË€ˇe Ä‚ĂË€žĂËÂÄ‚Ë‚¬ĹˇÄ‚ËÂÂÄ‚ËÂÄ‚Ë€šÂ¬ÄąÄľĂ„ĂË€šĂ‹ÂÂÂÄ‚ËÂÂÄ‚ËÂÄ‚Ë‚¬ĹˇĂ‚¬ĂĂË€ąĂËÂÄ‚Ë‚¬Ë‡e se postavke poniĂ„ĂË€šĂËÂÄ‚Ë‚¬ĹľÄ‚ĂË€žĂËÂÄ‚Ë‚¬Â¦Ă„ĂË€šĂËÂÄ‚Ë‚¬Ä…Ä‚ËÂÂÄ‚ËÂÄ‚Ë€šÂ¬Ă‹ĂË€ˇtiti kad zatvorite preglednik.