Adaptive Code via C#. Agile coding with design patterns and SOLID principles (2014)
CHAPTER 4.Symmetric Cryptography Fundamentals
CHAPTER 5.Symmetric Encryption
CHAPTER 6.Hashes and Message Authentication
CHAPTER 7.Public Key Cryptography
CHAPTER 8.Authentication and Key Exchange
CHAPTER 10.Public Key Infrastructure