aboutsummaryrefslogtreecommitdiffstats
path: root/doc/reading.txt
diff options
context:
space:
mode:
authorlloyd <[email protected]>2011-07-14 21:56:55 +0000
committerlloyd <[email protected]>2011-07-14 21:56:55 +0000
commite7fb8e717d7b4ba7bb3a4ba69a14d484b17abbac (patch)
tree2c087b69423c239c01cdd44ddf9f2dd748ce9bd8 /doc/reading.txt
parent82e218500e6f305d02feecc000b43a5d9448e11a (diff)
Move reading list to its own file
Diffstat (limited to 'doc/reading.txt')
-rw-r--r--doc/reading.txt23
1 files changed, 23 insertions, 0 deletions
diff --git a/doc/reading.txt b/doc/reading.txt
new file mode 100644
index 000000000..a0e547296
--- /dev/null
+++ b/doc/reading.txt
@@ -0,0 +1,23 @@
+
+Recommended Reading
+========================================
+
+It's a very good idea if you have some knowledge of cryptography
+*before* trying to use the library. This is an area where it is very
+easy to make mistakes, and where things are often subtle and/or
+counterintuitive. Obviously the library tries to provide things at a
+high level precisely to minimize the number of ways things can go
+wrong, but naive use will almost certainly not result in a secure
+system.
+
+Especially recommended are:
+
+- *Cryptography Engineering*
+ Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno
+
+- *Security Engineering -- A Guide to Building Dependable Distributed Systems*
+ Ross Anderson
+
+- *Handbook of Applied Cryptography*
+ Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone
+ (`available online <http://www.cacr.math.uwaterloo.ca/hac/>`_)