LEADER 01200nam--2200349---450- 001 990006131880203316 005 20161013122926.0 010 $a978-88-91 035 $a000613188 035 $aUSA01000613188 035 $a(ALEPH)000613188USA01 035 $a000613188 100 $a20160308d2013----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aDalle mine anti-persona alle cluster munitions$el'impegno del Movimento Internazionale della Croce Rossa e della Mezzaluna Rossa per la messa al bando delle armi convenzionali non discriminanti$fRenato Del Mastro 210 $a[S.l.]$ca cura dell'autore$d2013 215 $a199 p.$d23 cm 606 0 $aMine antiuomo$xControllo$xR$2BNCF 676 $a327.1743 700 1$aDEL MASTRO,$bRenato$0715672 801 0$aIT$bsalbc$gISBD 912 $a990006131880203316 951 $aXXIII.1.H. 654$b250100 L.M.$cXXIII.1.H.$d387169 959 $aBK 969 $aGIU 979 $aCHIARA$b90$c20160308$lUSA01$h1022 979 $aCHIARA$b90$c20160308$lUSA01$h1046 979 $aALESSANDRA$b90$c20161013$lUSA01$h1229 996 $aDalle mine anti-persona alle cluster munitions$91385419 997 $aUNISA LEADER 04263nam 2200673Ia 450 001 9910784058103321 005 20230313181056.0 010 $a1-281-07185-4 010 $a9786611071851 010 $a0-08-050345-4 024 0 $z9781597491044 035 $a(CKB)1000000000298111 035 $a(EBL)319199 035 $a(OCoLC)181421142 035 $a(SSID)ssj0000074341 035 $a(PQKBManifestationID)11171374 035 $a(PQKBTitleCode)TC0000074341 035 $a(PQKBWorkID)10119639 035 $a(PQKB)10455096 035 $a(Au-PeEL)EBL319199 035 $a(CaPaEBR)ebr10151834 035 $a(CaONFJC)MIL107185 035 $a(OCoLC)162597560 035 $a(CaSebORM)1597491047 035 $a(MiAaPQ)EBC319199 035 $a(PPN)170245802 035 $a(EXLCZ)991000000000298111 100 $a20061211d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography for developers$b[electronic resource] /$fTom St Denis, Simon Johnson 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing, Inc.$dc2007 215 $a1 online resource (449 p.) 300 $aIncludes index. 311 1 $a1-59749-104-7 327 $aFront Cover; Cryptography for Developers; Copyright Page; Contents; Preface; Chapter 1. Introduction; Introduction; Threat Models; What Is Cryptography?; Asset Management; Common Wisdom; Developer Tools; Summary; Organization; Frequently Asked Questions; Chapter 2. ASN.1 Encoding; Overview of ASN.1; ASN.1 Syntax; ASN.1 Data Types; ASN.1 Length Encodings; ASN. 1 Boolean Type; ASN.1 Integer Type; ASN.1 BIT STRING Type; ASN.1 OCTET STRING Type; ASN.1 NULL Type; ASN.1 OBJECT IDENTIFIER Type; ASN.1 SEQUENCE and SET Types; ASN.1 PrintableString and IA5STRING Types; ASN.1 UTCTIME Type 327 $aIniplementationASN.1 Length Routines; ASN.1 Primitive Encoders; Putting It All Together; Frequently Asked Questions; Chapter 3. Random Number Generation; Introduction; Measuring Entropy; How Bad Can It Be?; RNG Design; PRNG Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 4. Advanced Encryption Standard; Introduction; Implementation; Practical Attacks; Chaining Modes; Putting It All Together; Frequently Asked Questions; Chapter 5. Hash Functions; Introduction; Designs of SHS and Implementation; PKCS # 5 Key Derivation; Putting It All Together 327 $aFrequently Asked QuestionsChapter 6. Message-Authentication Code Algorithms; Introduction; Security Guidelines; Standards; Cipher Message Authentication Code; Hash Message Authentication Code; Putting It All Together; Frequently Asked Questions; Chapter 7. Encrypt and Authenticate Modes; Introduction; Design and Implementation; Putting It All Together; Frequently Asked Questions; Chapter 8. Large Integer Arithmetic; Introduction; What Are BigNums?; The Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 9. Public Key Algorithms; Introduction 327 $aGoals of Public Key CryptographyRSA Public Key Cryptography; Elliptic Curve Cryptography; Putting It All Together; Frequently Asked Questions; Index 330 $aThe only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on 606 $aComputer software$xDevelopment 606 $aCryptography 615 0$aComputer software$xDevelopment. 615 0$aCryptography. 676 $a005.8/2 676 $a005.82 700 $aSt. Denis$b Tom$0627563 701 $aJohnson$b Simon$0125487 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784058103321 996 $aCryptography for developers$93677946 997 $aUNINA