🔐 Cryptography & Security Fundamentals
- Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C (20th Anniversary Edition). Wiley.
- Paar, C., & Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
- Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
- Katz, J., & Lindell, Y. (2021). Introduction to Modern Cryptography (3rd ed.). CRC Press.
- Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.
💻 Blockchain & Decentralization
- Antonopoulos, A. M. (2017). Mastering Bitcoin: Programming the Open Blockchain (2nd ed.). O’Reilly Media.
- Mougayar, W. (2016). The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. Wiley.
- Dannen, C. (2017). Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. Apress.
- Drescher, D. (2017). Blockchain Basics: A Non-Technical Introduction in 25 Steps. Apress.
- Bashir, I. (2020). Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications (3rd ed.). Packt Publishing.
💰 Crypto Trading, Investing & Economics
- Burniske, C., & Tatar, J. (2018). Cryptoassets: The Innovative Investor’s Guide to Bitcoin and Beyond. McGraw-Hill Education.
- Kaminska, I., & Vigna, P. (2019). The Truth Machine: The Blockchain and the Future of Everything. Harper Business.
- Luno, A. (2021). DeFi and the Future of Finance. Wiley.
- Lewis, J. (2020). The Cryptocurrency Revolution: Finance in the Age of Bitcoin, Blockchain, and Digital Assets. Independently Published.
- Clark, J. (2023). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
🧠 Advanced & Academic References
- Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
- Wood, G. (2014). Ethereum: A Secure Decentralized Generalized Transaction Ledger (Yellow Paper). Ethereum Foundation.
- Stevens, M. (2012). Counter-Cryptanalysis of MD5 and SHA-1. Leiden University.
- Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
- Rivest, R. L., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
NIST is issuing a tentative agenda for the development of a SHA successor
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
The Cost of Insecurity: Understanding the “Non-Loss” Benefit of Cryptography
The Cost of “Just Enough” Security: Why Good Cryptography isn’t More Expensive
Cryptographer Consulting: Security Transparency vs. Relying on Ourselves
Why do people believe they should handle cryptography themselves?
The Illusion of Simplicity: Why Designing Your Own Cryptography Fails
Why Do I Need a Cryptographer?
Founding Members
Academic and Historical References
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs