Where do you think your book stands in relation to other books like Cryptography Engineering? Should people new to crypto read your book before or after CE, or instead of?
This is definitely in the same space as CE. When I just started writing this, tptacek wrote: http://sockpuppet.org/blog/2013/07/22/applied-practical-cryp...
... and that was a huge motivator and inspiration to me. So:
1. (Unlike Applied Cryptography) focus on things that you are actually likely to hit in the wild
2. (Unlike Cryptography Engineering) Written today, and hopefully perpetually updated; including things like ECC, all sorts of CBC attacks, et cetera.
3. (Unlike either) Free of charge, and freely redistributable :)
Everything about this project (except the TLS keys) is on Github.
Where do you think your book stands in relation to other books like Cryptography Engineering? Should people new to crypto read your book before or after CE, or instead of?