|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_on1311285711 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220418s2022 nyu ob 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d EBLCP
|d GW5XE
|d YDX
|d OCLCO
|d YDX
|d OCLCF
|d N$T
|d K6U
|d UKAHL
|d OCLCQ
|
019 |
|
|
|a 1311465865
|a 1311572569
|
020 |
|
|
|a 9781484281055
|q (electronic bk.)
|
020 |
|
|
|a 1484281055
|q (electronic bk.)
|
020 |
|
|
|z 1484281047
|
020 |
|
|
|z 9781484281048
|
024 |
7 |
|
|a 10.1007/978-1-4842-8105-5
|2 doi
|
029 |
1 |
|
|a AU@
|b 000071547491
|
029 |
1 |
|
|a AU@
|b 000071980592
|
035 |
|
|
|a (OCoLC)1311285711
|z (OCoLC)1311465865
|z (OCoLC)1311572569
|
037 |
|
|
|a 9781484281055
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.73.J38
|
072 |
|
7 |
|a COM051280
|2 bisacsh
|
082 |
0 |
4 |
|a 005.13/3
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Nita, Stefania Loredana,
|e author.
|
245 |
1 |
0 |
|a Cryptography and cryptanalysis in Java :
|b creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
|c Stefania Loredana Nita, Marius Iulian Mihailescu.
|
264 |
|
1 |
|a New York :
|b Apress,
|c [2022]
|
300 |
|
|
|a 1 online resource (230 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more Who This Book Is For Those who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.
|
505 |
0 |
|
|a Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK 17: New Features -- Conclusion -- References -- Chapter 3: Roadmap and Vision for Jakarta EE 10 -- Conclusion -- References -- Chapter 4: Java Cryptography Architecture -- Architecture and Design Principles -- JCA Classes and Algorithms -- Algorithms and Engine Classes -- Interfaces and Main Classes -- Data Encryption -- Hash Functions -- Signatures -- Generating Signatures
|
505 |
8 |
|
|a Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill Cipher -- Implementation -- Cryptanalysis -- Conclusion -- References -- Chapter 6: Formal Techniques for Cryptography -- Definitions -- Probabilities and Statistics -- Conditional Probability -- Random Variables -- Entropy -- A Little Algebra -- Elliptic Curves -- Conclusion -- References -- Chapter 7: Pseudorandom Number Generators -- Examples of PRNGs -- Linear Congruential PRNGs
|
505 |
8 |
|
|a Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs -- PRNGs Security -- Java.util.Random Class -- Conclusion -- References -- Chapter 8: Hash Functions -- Conclusion -- References -- Chapter 9: Symmetric Encryption Algorithms -- Data Encryption Standard -- The Generation of Keys -- Encryption and Decryption Process -- Operation Modes for DES -- Advanced Encryption Standard -- Encryption and Decryption Process -- Operation Modes for AES -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- The Knapsack Approach -- Algorithms
|
505 |
8 |
|
|a Conclusion -- References -- Chapter 11: Signature Schemes -- Conclusion -- References -- Chapter 12: Identification Schemes -- FFS Identification protocol -- Conclusion -- References -- Chapter 13: Lattice-Based Cryptography and NTRU -- Practical Implementation of the NTRU Library -- Conclusion -- References -- Chapter 14: Advanced Encryption Schemes -- Homomorphic Encryption -- Searchable Encryption -- Conclusion -- References -- Chapter 15: Cryptography Tools -- CryptTool -- OpenSSL -- Conclusion -- References -- Index
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Java (Computer program language)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Java (Langage de programmation)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Java (Computer program language)
|2 fast
|0 (OCoLC)fst00982065
|
700 |
1 |
|
|a Mihailescu, Marius Iulian,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 1484281047
|z 9781484281048
|w (OCoLC)1294284912
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484281055/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40335697
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6954122
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17914167
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3267271
|
994 |
|
|
|a 92
|b IZTAP
|