LEADER 00000cam a2200685Ia 4500 001 ocn162597560 003 OCoLC 005 20160527041004.5 006 m o d 007 cr cn||||||||| 008 070806s2007 maua o 001 0 eng d 019 80720103|a123904759|a181421142|a183925954|a488134076 |a507007895|a647627055|a707917804|a823830465|a823900164 |a824091401|a824139622 020 9781597491044 020 1597491047 020 9780080503455|q(electronic book) 020 0080503454|q(electronic book) 020 1281071854 020 9781281071859 024 1 792502910474 024 0 |z9781597491044 035 (OCoLC)162597560|z(OCoLC)80720103|z(OCoLC)123904759 |z(OCoLC)181421142|z(OCoLC)183925954|z(OCoLC)488134076 |z(OCoLC)507007895|z(OCoLC)647627055|z(OCoLC)707917804 |z(OCoLC)823830465|z(OCoLC)823900164|z(OCoLC)824091401 |z(OCoLC)824139622 037 135801:135936|bElsevier Science & Technology|nhttp:// www.sciencedirect.com 040 OPELS|beng|epn|cOPELS|dOPELS|dOCLCQ|dN$T|dYDXCP|dIDEBK |dOSU|dC6I|dNTG|dDKDLA|dZCU|dE7B|dZMC|dOCLCQ|dOCLCF|dDEBSZ |dUMI|dBAKER|dTXJ|dCEF|dEBLCP|dB24X7|dOCLCQ 049 RIDW 050 4 QA76.76.D47|bS84 2007eb 072 7 COM|x051390|2bisacsh 072 7 COM|x051440|2bisacsh 072 7 COM|x051230|2bisacsh 072 7 K|2bicssc 082 04 005.1|222 090 QA76.76.D47|bS84 2007eb 100 1 St. Denis, Tom.|0https://id.loc.gov/authorities/names/ no2007006998 245 10 Cryptography for developers /|cTom St Denis, Simon Johnson. 264 1 Rockland, MA :|bSyngress Pub.,|c[2007] 264 4 |c©2007 300 1 online resource (xxii, 423 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 500 Includes index. 505 00 |tIntroduction --|tASN. 1 Encodings --|tRandom Numbers -- |tLarge Integer Arithmetic --|tSymmetric Key Ciphers -- |tOne-Way Hashes --|tMessage Authentication Codes -- |tEncrypted Authentication Modes --|tPublic-Key Cryptography. 520 The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic. 588 0 Print version record. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Computer software|xDevelopment.|0https://id.loc.gov/ authorities/subjects/sh85029535 650 0 Cryptography.|0https://id.loc.gov/authorities/subjects/ sh85034453 650 7 Computer software|xDevelopment.|2fast|0https:// id.worldcat.org/fast/872537 650 7 Cryptography.|2fast|0https://id.worldcat.org/fast/884552 655 4 Electronic books. 700 1 Johnson, Simon.|0https://id.loc.gov/authorities/names/ no2008020715 776 08 |iPrint version:|aSt. Denis, Tom.|tCryptography for developers.|dRockland, MA : Syngress Pub., ©2007 |z1597491047|z9781597491044|w(OCoLC)76944838 856 40 |uhttps://rider.idm.oclc.org/login?url=http:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=179009|zOnline eBook. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading this eBook|uhttp:// guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20160615|cEBSCO|tebscoebooksacademic|lridw 994 92|bRID