Serious cryptography : a practical introduction to modern encryption / Jean-Philippe Aumasson.

"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-k...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Author: Aumasson, Jean-Philippe (Author)
Format: eBook
Language:English
Published: San Francisco, CA : No Starch Press, [2018]
Subjects:

MARC

LEADER 00000cam a2200000 i 4500
001 b10306948
006 m o d
007 cr |||||||||||
008 180418s2018 caua ob 001 0 eng d
005 20240829145737.3
020 |a 1593278268 
020 |a 9781593278267 
020 |z 9781593278267 
029 1 |a GBVCP  |b 1020522151 
035 |a (OCoLC)safo1031484718 
035 |a (OCoLC)1031484718 
037 |a safo9781492067511 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCA  |d OCLCF  |d STF  |d TOH  |d CEF  |d KSU  |d OCLCQ  |d DEBBG  |d G3B  |d S9I  |d UAB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d DXU 
049 |a GWRE 
050 4 |a QA76.9.A25 
100 1 |a Aumasson, Jean-Philippe,  |e author. 
245 1 0 |a Serious cryptography :  |b a practical introduction to modern encryption /  |c Jean-Philippe Aumasson. 
264 1 |a San Francisco, CA :  |b No Starch Press,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
347 |a data file 
588 0 |a Online resource; title from title page (Safari, viewed April 18, 2018). 
504 |a Includes bibliographical references and index. 
505 0 |a Encryption -- Randomness -- Cryptographic security -- Block ciphers -- Stream ciphers -- Hash functions -- Keyed hashing -- Authenticated encryption -- Hard problems -- RSA -- Diffie-Hellman -- Elliptic curves -- TLS -- Quantum and post-quantum. 
520 |a "This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You'll also learn: • Key concepts in cryptography, such as computational security, attacker models, and forward secrecy• The strengths and limitations of the TLS protocol behind HTTPS secure websites• Quantum computation and post-quantum cryptography• About various vulnerabilities by examining numerous code examples and use cases• How to choose the best algorithm or protocol and ask vendors the right questions Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications." 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory. 
650 0 |a Computer security. 
650 7 |a Coding theory  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
758 |i has work:  |a Serious cryptography (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGpQF43vWDD49GrvcXggw3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9781492067511/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a - 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 6bd4f16d-ded0-58ad-974b-ca74ee5ddec5  |s 42f6b924-97a1-5585-abfe-6ecb5aa08cd4 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i web  |n 1