Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography in C and C++

Buy
Cryptography in C and C++, 9781430250982 (1430250984), Apress, 2013

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing.

CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what ismore, none of these applications would work without cryptography!

The history of cryptography over the past thirty years is a unique success story. The most important event was surely the discovery of public key cryptography in the mid 1970s. It was truly a revolution: We know today that things are possible that previously we hadn’t even dared to think about. Diffie and Hellman were the first to formulate publicly the vision that secure communication must be able to take place spontaneously. Earlier, it was the case that sender and receiver had first to engage in secret communication to establish a common key. Diffie and Hellman asked, with the naivety of youth, whether one could communicate secretly without sharing a common secret. Their idea was that one could encrypt information without a secret key, that is, one that no one else could know. This idea signaled the birth of public key cryptography. That this vision was more than just wild surmise was shown a few years later with the advent of the RSA algorithm.

Modern cryptography has been made possible through the extraordinarily fruitful collaboration between mathematics and computer science.Mathematics provided the basis for the creation and analysis of algorithms. Without mathematics, and number theory in particular, public key cryptography would be impossible. Mathematics provides the results on the basis of which the algorithms operate.

If the cryptographic algorithms are to be realized, then one needs procedures that enable computation with large integers: The algorithms must not function only in theory; they must perform to real-world specifications. That is the task of computer science.

This book distinguishes itself from all other books on the subject in that it makes clear this relationship between mathematics and computing. I know of no book on cryptography that presents the mathematical basis so thoroughly while providing such extensive practical applications, and all of this in an eminently readable style.
(HTML tags aren't allowed.)

Particles And the Universe (Physics in Our World)
Particles And the Universe (Physics in Our World)
AS A STUDENT forced to flee Cambridge University during an epidemic in 1665–66, Isaac Newton—later knighted, becoming Sir Isaac—found a lot of time to do experiments. He put this time to good use, discovering the basis for many of the laws of physics he would go on to publish a few decades later. Newton’s equations...
BUY ME!  New Ways to Get Customers to Choose Your Product and Ignore the Rest
BUY ME! New Ways to Get Customers to Choose Your Product and Ignore the Rest

18 easy ways to ensure consumers choose your product over the competition’s

The world of consumer business is always hit hardest during a recession. But that doesn’t mean you can’t still drive sales and growth for your own organization. All it takes to come out on top, even in the toughest economies, is a...

Swift Recipes: A Problem-Solution Approach
Swift Recipes: A Problem-Solution Approach

Swift Recipes provides a problem solution approach for dealing with key aspects of the Swift programming language (covering version 1.2), ensuring you have the indispensable reference you need to successfully execute common programming tasks. You’ll learn how to use the unique features of the Swift programming language as well...


The Complete Guide to DAZ Studio 4
The Complete Guide to DAZ Studio 4

Bring your 3D characters to life with DAZ Studio

Overview

  • Learn to pose characters in a natural way with ease
  • Apply morphs to create new characters with endless variations and discover how to use lighting effectively
  • Covers DAWN: The new 3D figure on the block by Hivewire3D,...
The Joy of Clojure: Thinking the Clojure Way
The Joy of Clojure: Thinking the Clojure Way

The authors of this book have taken an ambitious and aggressive approach to teaching Clojure. You know how everyone loves to say they teach using the “drinking from a fire hydrant” method? Well, at times it feels like these guys are trying to shove that fire hydrant right up... let’s just say it’s a place...

SQL Hacks
SQL Hacks

Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy