Pro Cryptography and Cryptanalysis (Record no. 367761)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01850 a2200193 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250927140650.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250912b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781484277249 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Mihailescu M Nita S |
| 9 (RLIN) | 213039 |
| 245 ## - TITLE STATEMENT | |
| Title | Pro Cryptography and Cryptanalysis |
| Medium | Creating Advanced Algorithms with C# and .NET |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Name of publisher, distributor, etc. | Apress |
| Date of publication, distribution, etc. | 2021 |
| Place of publication, distribution, etc. | Bucharest Romania |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 556pp. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. <br/><br/>The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.<br/><br/>The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. <br/><br/> |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Algorithms |
| 9 (RLIN) | 213361 |
| 650 20 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computational Mathematics and Numerical Analysis |
| 9 (RLIN) | 213362 |
| 650 30 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer Science |
| 9 (RLIN) | 213363 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Vendor | Cost, normal purchase price | Total Checkouts | Barcode | Date last seen | Cost, replacement price | Bill Date | Koha item type | Original Barcode |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | MCA | MKSSS s K.B. Joshi Institute of Information Technology Library | MKSSS s K.B. Joshi Institute of Information Technology Library | 11/09/2025 | 87 | 1949.25 | KBJP-BK-2820 | 11/09/2025 | 2599.00 | 11/09/2025 | Books | 2820 |