Difference between revisions of "Cryptography for Developers"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Create ID Page for Literature Cryptography for Developers.)
 
(Automatic literature update)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{Literature|device_name=Cryptography for Developers|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-xxvPcgut6s.jpg|type=Book|author=Tom St Denis|language=English|isbn=978-1-597-49104-4|publisher=Syngress (2007)|pages=400|references=https://www.amazon.com/Cryptography-Developers-Tom-St-Denis/dp/1597491047|description=Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.}}

Latest revision as of 17:48, 1 February 2024

accessory-image-xxvPcgut6s.jpg

Information
Type Book
Author Tom St Denis
Language English
Publisher Syngress (2007)
ISBN 978-1-597-49104-4
Pages 400

Book Description

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.

References

https://www.amazon.com/Cryptography-Developers-Tom-St-Denis/dp/1597491047