Difference between revisions of "Cryptography for Developers"
Jump to navigation
Jump to search
Stuffsyncbot (talk | contribs) (Automatic literature creation) |
Stuffsyncbot (talk | contribs) (Automatic literature update) |
||
Line 1: | Line 1: | ||
{{Literature|device_name=Cryptography for Developers|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-xxvPcgut6s.jpg|type=Book|author=Tom St Denis|language=English|isbn=978-1-597-49104-4|publisher=Syngress (2007)|pages=400|references=https://www.amazon.com/Cryptography-Developers-Tom-St-Denis/dp/1597491047|description= | {{Literature|device_name=Cryptography for Developers|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-xxvPcgut6s.jpg|type=Book|author=Tom St Denis|language=English|isbn=978-1-597-49104-4|publisher=Syngress (2007)|pages=400|references=https://www.amazon.com/Cryptography-Developers-Tom-St-Denis/dp/1597491047|description=Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.}} |
Latest revision as of 17:48, 1 February 2024
Type | Book |
Author | Tom St Denis |
Language | English |
Publisher | Syngress (2007) |
ISBN | 978-1-597-49104-4 |
Pages | 400 |
Book Description
Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
References
https://www.amazon.com/Cryptography-Developers-Tom-St-Denis/dp/1597491047