02635nam 2200697 a 450 991101958530332120200520144314.0978661090120397812809012011280901209978047014877804701487729780470148761047014876410.1002/9780470148778(CKB)1000000000356371(EBL)297322(SSID)ssj0000104682(PQKBManifestationID)11131034(PQKBTitleCode)TC0000104682(PQKBWorkID)10079858(PQKB)10910935(MiAaPQ)EBC297322(CaBNVSL)mat05201512(IDAMS)0b0000648104a9b4(IEEE)5201512(PPN)256157324(OCoLC)181346903(Perlego)2752177(EXLCZ)99100000000035637120070117d2007 uy 0engur|n|---|||||txtccrApplied cryptanalysis breaking ciphers in the real world /Mark Stamp, Richard M. LowHoboken, N.J. Wiley-Intersciencec20071 online resource (424 p.)"A John Wiley & Sons, Inc., publication."9780470114865 047011486X Includes bibliographical references (p. 375-392) and index.Classic ciphers -- World War II ciphers -- Stream ciphers -- Block ciphers -- Hash functions -- Public key systems -- Public key attacks.The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.Computer securityData encryption (Computer science)CryptographyComputer security.Data encryption (Computer science)Cryptography.005.8/2Stamp Mark1340647Low Richard M.1967-1701536MiAaPQMiAaPQMiAaPQBOOK9911019585303321Applied cryptanalysis4085349UNINA