Cryptography for developers

The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC pu...

Full description

Bibliographic Details
Main Author: St. Denis, Tom
Other Authors: Johnson, Simon
Format: eBook
Language:English
Published: Rockland, MA Syngress Pub. 2007
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02568nmm a2200457 u 4500
001 EB001915839
003 EBX01000000000000001078741
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1597491047 
020 |a 9780080503455 
020 |a 1281071854 
020 |a 9781597491044 
020 |a 0080503454 
050 4 |a QA76.76.D47 
100 1 |a St. Denis, Tom 
245 0 0 |a Cryptography for developers  |c Tom St Denis, Simon Johnson 
260 |a Rockland, MA  |b Syngress Pub.  |c 2007 
300 |a xxii, 423 pages  |b illustrations 
653 |a Databescherming / gtt / (NL-LeOCL)095650350 
653 |a Computer software / Development / http://id.loc.gov/authorities/subjects/sh85029535 
653 |a Computer software / Development / fast 
653 |a COMPUTERS / Software Development & Engineering / Tools / bisacsh 
653 |a Cryptography 
653 |a Cryptografie / gtt / (NL-LeOCL)078514363 
653 |a Software / gtt / (NL-LeOCL)078669529 
653 |a COMPUTERS / Software Development & Engineering / General / bisacsh 
653 |a Cryptographie 
653 |a COMPUTERS / Programming / Open Source / bisacsh 
653 |a Cryptography / fast 
700 1 |a Johnson, Simon 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
776 |z 9780080503455 
776 |z 0080503454 
856 4 0 |u https://learning.oreilly.com/library/view/~/1597491047/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.1 
082 0 |a 620 
520 |a The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic