CrySP Library

Books in the Library

Computer Science

Computing Essentials 2007, Complete Edition
Timothy J. O'Leary, Linda I. O'Leary
Career Education, 2006 (first published 1990)
Paperback, 531 pages
ISBN13: 9780073516677
Computers: Tools for an Information Age
Harriet L. Capron
Prentice Hall, 2003 (first published 1987)
Paperback, 624 pages
ISBN13: 9780131405646

No cover

Studies In Complexity Theory
Ronald V. Book, Kenneth McAloon
Pitman Publishing, (first published 1986)
Hardcover, 226 pages
ISBN13: 9780273087557

No cover

Analysis of Algorithms and Data Structures
Lech Banachowski, Wojciech Rytter, Antoni Kreczmar
Addison Wesley Publishing Company, 1991 (first published 1989)
Hardcover, 300 pages
ISBN13: 9780201416930
Automatic Sequences: Theory, Applications, Generalizations
Jean-Paul Allouche, Jeffrey Shallit
Cambridge University Press, 2003 (first published 1999)
Hardcover, 588 pages
ISBN13: 9780521823326
Compared to What?: An Introduction to the Anaylsis of Algorithms (Principles of Computer Science Series)
Gregory J.E. Rawlins
W. H. Freeman, 1991
Hardcover, 536 pages
ISBN13: 9780716782438
Data Structures, Algorithms, And Performance
Derick Wood
Addison Wesley Longman, 1993
Hardcover, 594 pages
ISBN13: 9780201521481
Algorithms and Theory of Computation Handbook
Mikhail J. Atallah
CRC Press, 1998
Hardcover, 1312 pages
ISBN13: 9780849326493
Quantum Computation and Quantum Information (Cambridge Series on Information and the Natural Sciences)
Michael A. Nielsen, Isaac L. Chuang
Cambridge University Press, 2000
Paperback, 700 pages
ISBN13: 9780521635035
Introduction to Algorithms
Thomas H. Cormen, Charles E. Leiseron, Ronald L. Rivest, Clifford Stein
McGraw-Hill Science/Engineering/Math, 2001 (first published 1990)
Hardcover, 1056 pages
ISBN13: 9780070131514

Conference Proceedings

Selected Areas in Cryptography 2001
S. Vaudenay, S. Vaudenay
Springer, 2001
Paperback, 364 pages
ISBN13: 9783540430667
Selected Areas in Cryptography 2007
Carlisle Adams
Springer, 2007
Paperback, 407 pages
ISBN13: 9783540773597
Selected Areas In Cryptography 2009
Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
Springer, 2009
Paperback, 465 pages
ISBN13: 9783642054433
Selected Areas in Cryptography 2010
Alex Biryukov, Guang Gong, Douglas R. Stinson
Springer, 2011
Paperback, 409 pages
ISBN13: 9783642195730
Financial Cryptography and Data Security 2010
Radu Sion
Springer, 2010
Paperback, 432 pages
ISBN13: 9783642145766
Financial Cryptography and Data Security Workshops 2010 (RLCPS, WECSR, and WLC)
Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé
Springer, 2010
Paperback, 255 pages
ISBN13: 9783642149917
Financial Cryptography and Data Security 2011
George Danezis
Springer, 2012
Paperback, 332 pages
ISBN13: 9783642275753
Financial Cryptography and Data Security 2012
Springer, 2012
Paperback, 416 pages
ISBN13: 9783642329456
Financial Cryptography and Data Security Workshops 2012 (USEC and WECSR)
Jim Blythe
Springer, 2012
Paperback, 152 pages
ISBN13: 9783642346378
Information Theoretic Security 2008
Reihaneh Safavi-Naini
Springer, 2008
Paperback, 249 pages
ISBN13: 9783540850922
Privacy Enhancing Technologies 2008
Nikita Borisov
Springer, 2008
Paperback, 236 pages
ISBN13: 9783540706298
Privacy Enhancing Technologies 2009
Ian Goldberg
Springer, 2009
Paperback, 253 pages
ISBN13: 9783642031670
Privacy Enhancing Technologies 2012
Simone Fischer-H Bner, Matthew Wright
Springer, 2012
Paperback, 319 pages
ISBN13: 9783642316791
Privacy Enhancing Technologies 2013
Emiliano De Cristofaro, Matthew Wright
Springer, 2013
Paperback, 276 pages
ISBN13: 9783642390760
Advances In Cryptology - Eurocrypt 2009
Antoine Joux
Springer, 2009
Paperback, 609 pages
ISBN13: 9783642010002
Finite Fields: Theory, Applications, and Algorithms 1998
Ronald C. Mullin, Gary L. Mullen
American Mathematical Society(RI), 1998
Hardcover, 233 pages
ISBN13: 9780821808177


Cryptography: A Very Short Introduction
Fred Piper, Sean Murphy
Oxford University Press, USA, 2002
Paperback, 176 pages
ISBN13: 9780192803153
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Henri Cohen
Chapman & Hall/CRC, 2005
Hardcover, 808 pages
ISBN13: 9781584885184
User's Guide to Cryptography and Standards
Alex W. Dent
Artech House Publishers, 2004
Hardcover, 382 pages
ISBN13: 9781580535304

No cover

Digital Signatures
Mohan Atreya, Mohan Atreya
McGraw-Hill/Osborne Media, 2002
Paperback, 368 pages
ISBN13: 9780072194821
Code Breaking: A History and Exploration
Rudolph Kippenhahn
Overlook Books, 1999
ISBN13: 9780879519193
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Robert Churchhouse
Cambridge University Press, 2001 (first published 1997)
Paperback, 252 pages
ISBN13: 9780521008907
Cryptography and Network Security
William Stallings
Prentice Hall, 2005 (first published 1998)
Hardcover, 680 pages
ISBN13: 9780131873162
Cryptography and Network Security (7th ed.)
William Stallings
Pearson, 2017
Hardcover, 748 pages
ISBN13: 978-0-13-444428-4
Basic Methods of Cryptography
Jan C.A. van der Lubbe
Cambridge University Press, 1998
Paperback, 229 pages
ISBN13: 9780521555593
Introduction to Cryptography with Java Applets
David Bishop
Jones & Bartlett Publishers, 2002
Hardcover, 370 pages
ISBN13: 9780763722074
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Douglas R. Stinson
Chapman and Hall/CRC, 2005 (first published 1995)
Hardcover, 616 pages
ISBN13: 9781584885085
Post-Quantum Cryptography
Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
Springer, 2008
Hardcover, 246 pages
ISBN13: 9783540887010
Understanding And Applying Cryptography And Data Security
Adam J. Elbirt
Auerbach Publications, 2009
Hardcover, 637 pages
ISBN13: 9781420061604
Elliptic Curves in Cryptography
Ian F. Blake, Nigel P. Smart, G. Seroussi
Cambridge University Press, 1999
Paperback, 204 pages
ISBN13: 9780521653749
An Introduction to Cryptography
Richard A. Mollin
CRC Press, 2000
Hardcover, 392 pages
ISBN13: 9781584881278
An Introduction to Mathematical Cryptography
Jeffrey Hoffstein, Jill Pipher, J.H. Silverman
Springer, 2008
Hardcover, 523 pages
ISBN13: 9780387779935
Elliptic Curves
Lawrence C. Washington
CRC Press, 2003
Hardcover, 440 pages
ISBN13: 9781584883654
Foundations of Cryptography: Volume 1, Basic Tools
Oded Goldreich
Cambridge University Press, 2007 (first published 1997)
Paperback, 396 pages
ISBN13: 9780521035361
Foundations of Cryptography: Volume 2, Basic Applications
Oded Goldreich
Cambridge University Press, 2004
Hardcover, 373 pages
ISBN13: 9780521830843
Decrypted Secrets: Methods and Maxims of Cryptology
Friedrich L. Bauer
Springer-Verlag Telos, 2000 (first published 1997)
Hardcover, 470 pages
ISBN13: 9783540668718
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh
Anchor, 2000 (first published 1999)
Paperback, 366 pages
ISBN13: 9780385495325
Encyclopedia of Cryptography and Security, vol 2 L-Z
Henk C.A. van Tilborg, Sushil Jajodia
Springer, 2011
Hardcover, 1416 pages
ISBN13: 9781441959058
Practical Cryptography
Niels Ferguson, Bruce Schneier
Wiley, 2003
Paperback, 385 pages
ISBN13: 9780471223573


Elements of Real Analysis
Herbert S. Gaskill
Prentice Hall, 1997
Paperback, 501 pages
ISBN13: 9780138970673
How To Solve It: A New Aspect Of Mathematical Method
George Pólya
Penguin Books, Limited (UK), 1990 (first published 1944)
Paperback, 304 pages
ISBN13: 9780140124996
Chance Rules: An Informal Guide to Probability, Risk and Statistics
Brian S. Everitt
Copernicus Books, 1999
Paperback, 202 pages
ISBN13: 9780387987682
Mathematics of Choice: Or, How to Count Without Counting (New Mathematical Library)
Ivan Morton Niven
Mathematical Assn of Amer, 1975
ISBN13: 9780883856154
Commutative Algebra: With a View Toward Algebraic Geometry
David Eisenbud
Springer, 1999 (first published 1995)
Paperback, 788 pages
ISBN13: 9780387942698
Discrete Mathematics With Graph Theory
Edgar G. Goodaire, Michael M. Parmenter
Prentice Hall, 1997
Hardcover, 525 pages
ISBN13: 9780136020790
Proofs from THE BOOK
Martin Aigner
Springer, 2003 (first published 1998)
Hardcover, 240 pages
ISBN13: 9783540404606
A Computational Introduction to Number Theory and Algebra
Victor Shoup
Cambridge University Press, 2005
Hardcover, 517 pages
ISBN13: 9780521851541
CRC Handbook of Combinatorial Designs
CRC Press, 1996
Hardcover, 784 pages
ISBN13: 9780849389481
Mathematical Foundations of Computer Networking
Srinivasan Keshav
Addison-Wesley Professional, 2012
Paperback, 474 pages
ISBN13: 9780321792105


Fundamentals of Database Systems
Ramez Elmasri, Shamkant B. Navathe
Addison Wesley Longman, 2003 (first published 1989)
Hardcover, 1030 pages
ISBN13: 9780321122261
The Unofficial Guide to Ethical Hacking
Ankit Fadia
Course Technology PTR, 2002 (first published 2001)
Paperback, 752 pages
ISBN13: 9781931841726
The Non-Designer's Design Book
Robin P. Williams
Peachpit Press, 2003 (first published 1994)
Paperback, 191 pages
ISBN13: 9780321193858
Dave Baum's Definitive Guide to Lego Mindstorms
Dave Baum
Apress, 1999
Paperback, 385 pages
ISBN13: 9781893115095

No cover

Physics for Biological Sciences, (Canadian)
F.R. Hallett
Nelson Thomson Learning, 2000
ISBN13: 9780774737289
Database System Concepts
Abraham Silberschatz, Henry F. Korth, S. Sudarshan
McGraw-Hill Education, 2005 (first published 1987)
Hardcover, 1142 pages
ISBN13: 9780072958867
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati
Auerbach Publications, 2007
Hardcover, 470 pages
ISBN13: 9781420052176

Building in Big Brother: The Cryptographic Policy Debate
Lance J. Hoffman
Springer, 1995
Paperback, 560 pages
ISBN13: 9780387944418

Queer Privacy: Essays From The Margins Of Society
Sarah Jamie Lewis
Mascherari Press, 2017
Paperback, 69 pages
ISBN13: 9781365978142

Conspiracy: Peter Thiel, Hulk Hogan, Gawker, and the Anatomy of Intrigue
Ryan Holiday
Portfolio, 2018
Hardcover, 336 pages
ISBN13: 9780735217645


Introduction to Network Security
Jacobson Jacobson
CRC Press, 2008
Hardcover, 502 pages
ISBN13: 9781584885436
Network Security
Steven L. Shaffer, Alan R. Simon
Academic Press, 1994
Paperback, 318 pages
ISBN13: 9780126380101
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
John Wiley & Sons, 2008 (first published 2001)
Hardcover, 1040 pages
ISBN13: 9780470068526
Smart Card Security and Applications
Mike Hendry
Artech House Publishers, 2001 (first published 1997)
Hardcover, 304 pages
ISBN13: 9781580531566
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
Levente Buttyán, Jean-Pierre Hubaux
Cambridge University Press, 2007
Hardcover, 485 pages
ISBN13: 9780521873710
Computer Security: Protecting Digital Resources
Robert C. Newman
Jones & Bartlett Publishers, 2009
Paperback, 453 pages
ISBN13: 9780763759940
Security in Computing
Charles P. Pfleeger, Shari Lawrence Pfleeger
Prentice Hall PTR, 2006 (first published 1988)
Hardcover, 845 pages
ISBN13: 9780132390774
No cover

Computer Security: Principles and Practice (4th ed.)
William Stallings, Lawrie Brown
Pearson, 2017
Hardcover, 778 pages
ISBN13: 978-0-13-479410-5
Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach
Charles P. Pfleeger, Shari Lawrence Pfleeger
Prentice Hall, 2011
Hardcover, 799 pages
ISBN13: 9780132789462
Data Privacy and Security: Encryption and Information Hiding
David Salomon, W.J. Ewens, W. J. Ewens
Springer, 2003
Hardcover, 465 pages
ISBN13: 9780387003115
Writing Secure Code
Michael Howard, David LeBlanc
Microsoft Press, 2001
Paperback, 477 pages
ISBN13: 9780735615885
Network Defense and Countermeasures: Principles and Practices
Chuck Easttom
Prentice Hall, 2005
Paperback, 448 pages
ISBN13: 9780131711266
Security Policies and Procedures: Principles and Practices
Sari Greene
Prentice Hall, 2005
Paperback, 571 pages
ISBN13: 9780131866911
E-Mail Security: How to Keep Your Electronic Messages Private
Bruce Schneier
John Wiley & Sons, 1995
Paperback, 384 pages
ISBN13: 9780471053187
Harley Hahn's Internet Insecurity
Harley Hahn
Prentice Hall PTR, 2001
Paperback, 528 pages
ISBN13: 9780130334480
Smart Cards, Tokens, Security and Applications
Keith E. Mayes, Keith Mayes, Keith E. Mayes
Springer, 2008
Hardcover, 392 pages
ISBN13: 9780387721972
Caution! Wireless Networking: Preventing a Data Disaster
Jack McCullough
John Wiley & Sons, 2004
Paperback, 268 pages
ISBN13: 9780764572135
Kerberos: A Network Authentication System
Brian Tung
Addison-Wesley Professional, 1999
Paperback, 192 pages
ISBN13: 9780201379242
Effective Cybersecurity: A Guide to Using Best Practices and Standards
William Stallings
Addison-Wesley Professional, 2018
Paperback, 800 pages
ISBN13: 9780134772806

Software Development

Practical Object-Oriented Development in C++ and Java
Cay S. Horstmann
John Wiley & Sons, 1997
Paperback, 576 pages
ISBN13: 9780471147671
Elementary Functions:: Algorithms and Implementation
J.-M. Muller
Birkhauser, 1997
Hardcover, 228 pages
ISBN13: 9780817639907
Intelligent Methods in Signal Processing and Communications
D. Docampo-Amoedo, D. Docampo-Amoedo
Birkhauser, 1997
Hardcover, 318 pages
ISBN13: 9780817639600
Modern Software Tools for Scientific Computing
E. Arge, H.P. Langtangen
Birkhauser, 1997
Hardcover, 380 pages
ISBN13: 9780817639747
Computational Signal Processing with Wavelets
Anthony Teolis
Birkhauser, 1998
Hardcover, 324 pages
ISBN13: 9780817639099


No cover

Handbook for Writers (Canadian Edition)
Jane Flick, Celia Millward
Nelson Thomson Learning, 1999
ISBN13: 9780774736077
Writing for Computer Science
Justin Zobel
Springer, 2004 (first published 1997)
Paperback, 270 pages
ISBN13: 9781852338022
The Elements of Style
William Strunk Jr., E.B. White, Roger Angell
Longman Publishing Group, 2000 (first published 1918)
Paperback, 105 pages
ISBN13: 9780205309023
Tex For The Beginner
Wynter Snow
Addison-Wesley Professional, 1992
Paperback, 416 pages
ISBN13: 9780201547993
The Latex Companion
Frank Mittelbach, Michel Goossens, Johannes Braams, David Carlisle, Chris Rowley
Addison-Wesley Professional, 2004 (first published 1993)
Paperback, 1120 pages
ISBN13: 9780201362992
Guide to Latex
Helmut Kopka, Patrick W. Daly
Addison-Wesley Professional, 2003
Paperback, 624 pages
ISBN13: 9780321173850


The bookcase in the CrySP lounge holds printed versions of many theses written by past CrySP students. Because the school stopped requiring printed theses several years ago, and not all students printed a copy for the lab even when it was required, not all theses are available. However, most faculty members will have personal printed copies of their students' theses. The following theses are on the CrySP library shelf:

Degree Year Student Supervisor Title
MMath 2001 James Alexander Muir Doug Stinson Techniques of Side Channel Cryptanalysis
PhD 2003 Khoongming Khoo Doug Stinson Sequence Design and Construction of Cryptographic Boolean Functions
MMath 2004 Hao-Hsien Bobby Wang Doug Stinson Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting (2 copies)
PhD 2004 James Alexander Muir Doug Stinson Efficient Integer Representations for Cryptographic Operations
MMath 2005 Henry Kar Yee Au Doug Stinson Unconditionally-Secure Authentication Codes and Digital Signatures (2 copies)
MMath 2005 Sheng Zhang Doug Stinson Algorithms for Detecting Cheaters in Threshold Schemes (article) (2 copies)
MMath 2005 Jooyoung Lee Doug Stinson Combinatorial Approaches to Key Predistribution for Distributed Sensor Networks (download, not on UWSpace)
PhD 2007 M. Jason Hinek Doug Stinson On the Security of Some Variants of RSA
MMath 2008 Jiayuan Sui Doug Stinson A Security Analysis of Some Physical Content Distribution Systems (2 copies)
MMath 2008 Kevin Henry Doug Stinson The Theory and Applications of Homomorphic Cryptography (2 copies)
MMath 2008 Joel Reardon Ian Goldberg Improving Tor using a TCP-over-DTLS Tunnel
PhD 2008 Atefeh Mashatan Doug Stinson Message Authentication and Recognition Protocols Using Two-Channel Cryptography
MMath 2010 Can Tang Ian Goldberg An Improved Algorithm for Tor Circuit Scheduling
MMath 2010 Wanying Luo Urs Hengartner Designing a Privacy-Aware Location Proof Architecture
MMath 2010 Qi Xie Urs Hengartner Privacy-Preserving Interest Matching for Mobile Social Networking
PhD 2010 Aniket Pundlik Kate Ian Goldberg Distributed Key Generation and Its Applications
MMath 2010 Ryan Henry Ian Goldberg Nymbler: Privacy-enhanced Protection from Abuses of Anonymity
MMath 2010 Jalaj Kumar Upadhyay Doug Stinson Generic Attacks on Hash Functions
PhD 2011 Femi George Olumofin Ian Goldberg Practical Private Information Retrieval
MMath 2012 Robin Smits Ian Goldberg BridgeSPA: A Single Packet Authorization System for Tor Bridges
PhD 2013 Colleen M. Swanson Doug Stinson Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem
MMath 2013 Hooman Mohajeri Moghaddam Ian Goldberg SkypeMorph: Protocol Obfuscation for Censorship Resistance
MMath 2013 Yizhou Huang Ian Goldberg Outsourced Private Information Retrieval with Pricing and Access Control
PhD 2013 Mashael Saad Al-Sabah Ian Goldberg Network Performance Improvements for Low-Latency Anonymity Networks
MMath 2014 Casey Devet Ian Goldberg The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency
PhD 2015 Kevin J. Henry Doug Stinson Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks
MMath 2015 Nik Unger Ian Goldberg Deniable Key Exchanges for Secure Messaging
PhD 2015 Mohammad Tariq Elahi Ian Goldberg Towards more Effective Censorship Resistance Systems
PhD 2015 Tao Wang Ian Goldberg Website Fingerprinting: Attacks and Defenses
MMath 2017 Justin Tracey Ian Goldberg Building a Better Tor Experimentation Platform from the Magic of Dynamic ELFs
MMath 2018 Bailey Kacsmar Doug Stinson Designing Efficient Algorithms for Combinatorial Repairable Threshold Schemes
Edit | Attach | Watch | Print version | History: r43 < r42 < r41 < r40 < r39 | Backlinks | Raw View | Raw edit | More topic actions
Topic revision: r43 - 2019-11-07 - BaileyKacsmar
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback