Serious cryptography: a practical introduction to modern encryption
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key tec...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco, CA
No Starch Press
[2025]
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781098182472/?ar |
Zusammenfassung: | This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. This new second edition has been thoroughly revised and updated, with a new chapter on cryptocurrency. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (376 Seiten) illustrations |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-108527778 | ||
003 | DE-627-1 | ||
005 | 20241001123227.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241001s2025 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)108527778 | ||
035 | |a (DE-599)KEP108527778 | ||
035 | |a (ORHE)9781098182472 | ||
035 | |a (DE-627-1)108527778 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/24 |2 23/eng/20240826 | |
100 | 1 | |a Aumasson, Jean-Philippe |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Serious cryptography |b a practical introduction to modern encryption |c by Jean-Philippe Aumasson |
250 | |a Second edition. | ||
264 | 1 | |a San Francisco, CA |b No Starch Press |c [2025] | |
300 | |a 1 Online-Ressource (376 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. This new second edition has been thoroughly revised and updated, with a new chapter on cryptocurrency. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications. | ||
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Coding theory | |
650 | 0 | |a Computer security | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Sécurité informatique | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098182472/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-108527778 |
---|---|
_version_ | 1821494926757593088 |
adam_text | |
any_adam_object | |
author | Aumasson, Jean-Philippe |
author_facet | Aumasson, Jean-Philippe |
author_role | aut |
author_sort | Aumasson, Jean-Philippe |
author_variant | j p a jpa |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)108527778 (DE-599)KEP108527778 (ORHE)9781098182472 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02110nam a22003852 4500</leader><controlfield tag="001">ZDB-30-ORH-108527778</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123227.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108527778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108527778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098182472</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108527778</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23/eng/20240826</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aumasson, Jean-Philippe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Serious cryptography</subfield><subfield code="b">a practical introduction to modern encryption</subfield><subfield code="c">by Jean-Philippe Aumasson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, CA</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (376 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. This new second edition has been thoroughly revised and updated, with a new chapter on cryptocurrency. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098182472/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-108527778 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:09Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (376 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | No Starch Press |
record_format | marc |
spelling | Aumasson, Jean-Philippe VerfasserIn aut Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson Second edition. San Francisco, CA No Starch Press [2025] 1 Online-Ressource (376 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. This new second edition has been thoroughly revised and updated, with a new chapter on cryptocurrency. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications. Data encryption (Computer science) Coding theory Computer security Chiffrement (Informatique) Sécurité informatique |
spellingShingle | Aumasson, Jean-Philippe Serious cryptography a practical introduction to modern encryption Data encryption (Computer science) Coding theory Computer security Chiffrement (Informatique) Sécurité informatique |
title | Serious cryptography a practical introduction to modern encryption |
title_auth | Serious cryptography a practical introduction to modern encryption |
title_exact_search | Serious cryptography a practical introduction to modern encryption |
title_full | Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson |
title_fullStr | Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson |
title_full_unstemmed | Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson |
title_short | Serious cryptography |
title_sort | serious cryptography a practical introduction to modern encryption |
title_sub | a practical introduction to modern encryption |
topic | Data encryption (Computer science) Coding theory Computer security Chiffrement (Informatique) Sécurité informatique |
topic_facet | Data encryption (Computer science) Coding theory Computer security Chiffrement (Informatique) Sécurité informatique |
work_keys_str_mv | AT aumassonjeanphilippe seriouscryptographyapracticalintroductiontomodernencryption |