Cryptography for developers:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic Introduction -- - ASN. 1 Encodings -- - Random Numbers -- - Large Integer Arithmetic -- - Symmetric Key Ciphers -- - One-Way Hashes -- - Message Authentication Codes -- - Encrypted Authentication Modes -- - Public-Key Cryptography |
Beschreibung: | 1 Online-Ressource (xxii, 423 p.) |
ISBN: | 0080503454 1597491047 9780080503455 9781597491044 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044473 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080503454 |c electronic bk. |9 0-08-050345-4 | ||
020 | |a 1597491047 |9 1-59749-104-7 | ||
020 | |a 9780080503455 |c electronic bk. |9 978-0-08-050345-5 | ||
020 | |a 9781597491044 |9 978-1-59749-104-4 | ||
035 | |a (OCoLC)162597560 | ||
035 | |a (DE-599)BVBBV043044473 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.1 |2 22 | |
100 | 1 | |a St. Denis, Tom |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cryptography for developers |c Tom St Denis, Simon Johnson |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (xxii, 423 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic | ||
500 | |a Introduction -- - ASN. 1 Encodings -- - Random Numbers -- - Large Integer Arithmetic -- - Symmetric Key Ciphers -- - One-Way Hashes -- - Message Authentication Codes -- - Encrypted Authentication Modes -- - Public-Key Cryptography | ||
650 | 7 | |a COMPUTERS / Programming / Open Source |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / Tools |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / General |2 bisacsh | |
650 | 7 | |a Computer software / Development |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 4 | |a Computer software |x Development | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwickler |0 (DE-588)7701096-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Softwareentwickler |0 (DE-588)7701096-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Johnson, Simon |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469010 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175410305433600 |
---|---|
any_adam_object | |
author | St. Denis, Tom |
author_facet | St. Denis, Tom |
author_role | aut |
author_sort | St. Denis, Tom |
author_variant | d t s dt dts |
building | Verbundindex |
bvnumber | BV043044473 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162597560 (DE-599)BVBBV043044473 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03504nmm a2200553zc 4500</leader><controlfield tag="001">BV043044473</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080503454</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050345-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491047</subfield><subfield code="9">1-59749-104-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080503455</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050345-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491044</subfield><subfield code="9">978-1-59749-104-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162597560</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044473</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">St. Denis, Tom</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography for developers</subfield><subfield code="c">Tom St Denis, Simon Johnson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 423 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- - ASN. 1 Encodings -- - Random Numbers -- - Large Integer Arithmetic -- - Symmetric Key Ciphers -- - One-Way Hashes -- - Message Authentication Codes -- - Encrypted Authentication Modes -- - Public-Key Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming / Open Source</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / Tools</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software / Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwickler</subfield><subfield code="0">(DE-588)7701096-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareentwickler</subfield><subfield code="0">(DE-588)7701096-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnson, Simon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469010</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044473 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:51Z |
institution | BVB |
isbn | 0080503454 1597491047 9780080503455 9781597491044 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469010 |
oclc_num | 162597560 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 423 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | St. Denis, Tom Verfasser aut Cryptography for developers Tom St Denis, Simon Johnson Rockland, MA Syngress Pub. c2007 1 Online-Ressource (xxii, 423 p.) txt rdacontent c rdamedia cr rdacarrier Includes index The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic Introduction -- - ASN. 1 Encodings -- - Random Numbers -- - Large Integer Arithmetic -- - Symmetric Key Ciphers -- - One-Way Hashes -- - Message Authentication Codes -- - Encrypted Authentication Modes -- - Public-Key Cryptography COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh COMPUTERS / Software Development & Engineering / General bisacsh Computer software / Development fast Cryptography fast Computer software Development Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf Softwareentwickler (DE-588)7701096-6 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Softwareentwickler (DE-588)7701096-6 s 1\p DE-604 Johnson, Simon Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | St. Denis, Tom Cryptography for developers COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh COMPUTERS / Software Development & Engineering / General bisacsh Computer software / Development fast Cryptography fast Computer software Development Cryptography Kryptologie (DE-588)4033329-2 gnd Softwareentwickler (DE-588)7701096-6 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)7701096-6 |
title | Cryptography for developers |
title_auth | Cryptography for developers |
title_exact_search | Cryptography for developers |
title_full | Cryptography for developers Tom St Denis, Simon Johnson |
title_fullStr | Cryptography for developers Tom St Denis, Simon Johnson |
title_full_unstemmed | Cryptography for developers Tom St Denis, Simon Johnson |
title_short | Cryptography for developers |
title_sort | cryptography for developers |
topic | COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh COMPUTERS / Software Development & Engineering / General bisacsh Computer software / Development fast Cryptography fast Computer software Development Cryptography Kryptologie (DE-588)4033329-2 gnd Softwareentwickler (DE-588)7701096-6 gnd |
topic_facet | COMPUTERS / Programming / Open Source COMPUTERS / Software Development & Engineering / Tools COMPUTERS / Software Development & Engineering / General Computer software / Development Cryptography Computer software Development Kryptologie Softwareentwickler |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179009 |
work_keys_str_mv | AT stdenistom cryptographyfordevelopers AT johnsonsimon cryptographyfordevelopers |