Cryptography for Developers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cryptography for Developers by Tom St Denis, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Tom St Denis ISBN: 9780080503455
Publisher: Elsevier Science Publication: December 1, 2006
Imprint: Syngress Language: English
Author: Tom St Denis
ISBN: 9780080503455
Publisher: Elsevier Science
Publication: December 1, 2006
Imprint: Syngress
Language: English

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.

  • The author is the developer of the industry standard cryptographic suite of tools called LibTom
  • A regular expert speaker at industry conferences and events on this development
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.

More books from Elsevier Science

Cover of the book Developing New Functional Food and Nutraceutical Products by Tom St Denis
Cover of the book Advances in the Study of Behavior by Tom St Denis
Cover of the book G Protein Signaling Pathways in Health and Disease by Tom St Denis
Cover of the book Mims' Pathogenesis of Infectious Disease by Tom St Denis
Cover of the book Genetic Instabilities and Neurological Diseases by Tom St Denis
Cover of the book Analytical Solution Methods for Boundary Value Problems by Tom St Denis
Cover of the book Intersection by Tom St Denis
Cover of the book Intelligent Fault Diagnosis and Remaining Useful Life Prediction of Rotating Machinery by Tom St Denis
Cover of the book Emotions, Technology, and Digital Games by Tom St Denis
Cover of the book Biofuels by Tom St Denis
Cover of the book Food Toxicants Analysis by Tom St Denis
Cover of the book The Clinician’s Guide to Treatment and Management of Youth with Tourette Syndrome and Tic Disorders by Tom St Denis
Cover of the book International Review of Cell and Molecular Biology by Tom St Denis
Cover of the book Heterogeneous System Architecture by Tom St Denis
Cover of the book Advances in Sugarcane Biorefinery by Tom St Denis
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy