🔐 Cryptography & Security Fundamentals

  1. Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C (20th Anniversary Edition). Wiley.
  2. Paar, C., & Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
  3. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
  4. Katz, J., & Lindell, Y. (2021). Introduction to Modern Cryptography (3rd ed.). CRC Press.
  5. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.

💻 Blockchain & Decentralization

  1. Antonopoulos, A. M. (2017). Mastering Bitcoin: Programming the Open Blockchain (2nd ed.). O’Reilly Media.
  2. Mougayar, W. (2016). The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. Wiley.
  3. Dannen, C. (2017). Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. Apress.
  4. Drescher, D. (2017). Blockchain Basics: A Non-Technical Introduction in 25 Steps. Apress.
  5. Bashir, I. (2020). Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications (3rd ed.). Packt Publishing.

💰 Crypto Trading, Investing & Economics

  1. Burniske, C., & Tatar, J. (2018). Cryptoassets: The Innovative Investor’s Guide to Bitcoin and Beyond. McGraw-Hill Education.
  2. Kaminska, I., & Vigna, P. (2019). The Truth Machine: The Blockchain and the Future of Everything. Harper Business.
  3. Luno, A. (2021). DeFi and the Future of Finance. Wiley.
  4. Lewis, J. (2020). The Cryptocurrency Revolution: Finance in the Age of Bitcoin, Blockchain, and Digital Assets. Independently Published.
  5. Clark, J. (2023). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.

🧠 Advanced & Academic References

  1. Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
  2. Wood, G. (2014). Ethereum: A Secure Decentralized Generalized Transaction Ledger (Yellow Paper). Ethereum Foundation.
  3. Stevens, M. (2012). Counter-Cryptanalysis of MD5 and SHA-1. Leiden University.
  4. Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
  5. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126.