A superb introduction to modern encryption and cryptography. For those looking to quickly get up to speed on the topics, this makes for an excellent go-to guide. Ben Rothke, RSA Conference
It's really a love letter to cryptography. Nadim Kobeissi
For those who really want to understand how cryptography works, and who need to use it in practice, I thoroughly recommend Serious Cryptography. Martijn Grooten, Virus Bulletin
Impressive in its breadth...the state of the art in applied cryptography is distilled here in a mere 282 pages. Federico Lucifredi, The Hub
Aumasson successfully ensures that the reader has a strong understanding of cryptography s core ideas... Serious Cryptography is a must read for anyone wanting to enter cryptographic engineering. Infosecurity Magazine
Each chapter not only explains concepts and key implementation details, but also highlights possible pitfalls, common mistakes, and finishes with a list of recommended materials. Artificial Truth
"Jean-Philippe Aumasson's Serious Cryptography is a classic (and serious) introduction to the field." Mary Branscombe, ZDNet
"It's advanced but the best book I've ever read for PKI is Serious Cryptography by Aumasson. Probably don't want to start with it but if you get serious you'll want to read it." Chris Sandvick, @ChrisSandvick
"My favorite reference." Colin O'Flynn, Circuit Cellar
"For those wanting to go beyond the basics of cryptography in the blockchain, 'Serious Cryptography' by Jean-Philippe Aumasson is an invaluable resource." Halborn Security
Foreword by Matthew D. Green Preface Abbreviations Chapter 1: Encryption Chapter 2: Randomness Chapter 3: Cryptographic Security Chapter 4: Block Ciphers Chapter 5: Stream Ciphers Chapter 6: Hash Functions Chapter 7: Keyed Hashing Chapter 8: Authenticated Encryption Chapter 9: Hard Problems Chapter 10: RSA Chapter 11: Diffie Hellman Chapter 12: Elliptic Curves Chapter 13: TLS Chapter 14: Quantum and Post-Quantum Index
Jean-Philippe Aumasson is Principal Research Engineer at Kudelski Security, an international cybersecurity company based in Switzerland. He has authored more than 40 research articles in the field of cryptography and cryptanalysis and designed the widely used hash functions BLAKE2 and SipHash. He speaks regularly at information security conferences and has presented at Black Hat, DEF CON, Troopers, and Infiltrate.