Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography in C and C++

Buy
Cryptography in C and C++, 9781430250982 (1430250984), Apress, 2013

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing.

CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what ismore, none of these applications would work without cryptography!

The history of cryptography over the past thirty years is a unique success story. The most important event was surely the discovery of public key cryptography in the mid 1970s. It was truly a revolution: We know today that things are possible that previously we hadn’t even dared to think about. Diffie and Hellman were the first to formulate publicly the vision that secure communication must be able to take place spontaneously. Earlier, it was the case that sender and receiver had first to engage in secret communication to establish a common key. Diffie and Hellman asked, with the naivety of youth, whether one could communicate secretly without sharing a common secret. Their idea was that one could encrypt information without a secret key, that is, one that no one else could know. This idea signaled the birth of public key cryptography. That this vision was more than just wild surmise was shown a few years later with the advent of the RSA algorithm.

Modern cryptography has been made possible through the extraordinarily fruitful collaboration between mathematics and computer science.Mathematics provided the basis for the creation and analysis of algorithms. Without mathematics, and number theory in particular, public key cryptography would be impossible. Mathematics provides the results on the basis of which the algorithms operate.

If the cryptographic algorithms are to be realized, then one needs procedures that enable computation with large integers: The algorithms must not function only in theory; they must perform to real-world specifications. That is the task of computer science.

This book distinguishes itself from all other books on the subject in that it makes clear this relationship between mathematics and computing. I know of no book on cryptography that presents the mathematical basis so thoroughly while providing such extensive practical applications, and all of this in an eminently readable style.
(HTML tags aren't allowed.)

Novel Immune Potentiators and Delivery Technologies for Next Generation Vaccines
Novel Immune Potentiators and Delivery Technologies for Next Generation Vaccines

Development of new-generation vaccines is now more challenging than ever, as identifying, purifying and evaluating vaccine antigens is a complex undertaking. Most importantly, once the relevant antigens have been identified, key focus then shifts to the development of suitable delivery systems and formulations to achieve maximum in vivo...

Robin Williams Cool Mac Apps, Second Edition : A guide to iLife 05, .Mac, and more (2nd Edition)
Robin Williams Cool Mac Apps, Second Edition : A guide to iLife 05, .Mac, and more (2nd Edition)
Robin Williams Cool Mac Apps: A Guide to iLife 05, .Mac, and More is a companion volume to Robin Williams Mac OS X Book, Tiger Edition. Together they continue the tradition of Robin's classic guide to the Mac OS, ...
The Project Management Life Cycle: A Complete Step-By-Step Methodology for Initiating, Planning, Executing & Closing a Project Successfully
The Project Management Life Cycle: A Complete Step-By-Step Methodology for Initiating, Planning, Executing & Closing a Project Successfully
Over the past 20 years, businesses around the world have undergone rapid change. No longer are customers happy with their ‘status quo’ products or services: they expect businesses to adapt rapidly to the changing environment by providing more offerings, cheaper and faster than before. This rate of change has forced businesses to...

Employment and Re-Industrialisation in Post Soeharto Indonesia (Critical Studies of the Asia-Pacific)
Employment and Re-Industrialisation in Post Soeharto Indonesia (Critical Studies of the Asia-Pacific)
This book studies the challenges for Indonesia, once a miracle economy, as it faces premature deindustrialisation, rising inequality and domestic and external factors impacting its export-oriented industrialization. Since the fall of Soeharto, Indonesia has undergone a far-reaching systemic transition from centralised and autocratic governance...
The MD Anderson Manual of Medical Oncology
The MD Anderson Manual of Medical Oncology

A concise, up-to-date clinician's guide to cancer management -- from the leaders in the field

A Doody's Core Title!

The MD Anderson Cancer Center is ranked as the world's leading institution in cancer medicine. With publication of the MD Anderson Manual of Medical Oncology, the editorial...

Home Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Home Networking All-in-One Desk Reference For Dummies (Computer/Tech)
If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue!

A network will make your life...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy