LEADER 01128nam0-22003851i-450- 001 990005473820203316 005 20010829120000.0 035 $a000547382 035 $aUSA01000547382 035 $a(ALEPH)000547382USA01 035 $a000547382 100 $a20010829d1986-------|0itac50------ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $a<> Finanza locale tra innovazione e conservazione$fEzio Citterio e Ario Rupeni 210 $aRimini :Maggioli Editore$d1986 215 $a166 p.$d24 cm. 606 $aFinanza locale$2FI 620 $dRimini 676 $a335$cEconomia socialista$v21 700 1$aCITTERIO,$bEzio$0410125 701 1$aRUPENI,$bArio$0116359 712 $aMaggioli 801 $aIT$bSOL$c20120104 912 $a990005473820203316 950 $aDIP.TO SCIENZE ECONOMICHE - (SA)$dDS 300 335 CIT$e3091 DISES 951 $a300 335 CIT$b3091 DISES 959 $aBK 969 $aDISES 979 $c20121027$lUSA01$h1532 979 $c20121027$lUSA01$h1613 996 $aFinanza locale tra innovazione e conservazione$934546 997 $aUNISA NUM $aUSA7663 LEADER 04263nam 2200673Ia 450 001 9910784058103321 005 20230313181056.0 010 $a1-281-07185-4 010 $a9786611071851 010 $a0-08-050345-4 024 0 $z9781597491044 035 $a(CKB)1000000000298111 035 $a(EBL)319199 035 $a(OCoLC)181421142 035 $a(SSID)ssj0000074341 035 $a(PQKBManifestationID)11171374 035 $a(PQKBTitleCode)TC0000074341 035 $a(PQKBWorkID)10119639 035 $a(PQKB)10455096 035 $a(Au-PeEL)EBL319199 035 $a(CaPaEBR)ebr10151834 035 $a(CaONFJC)MIL107185 035 $a(OCoLC)162597560 035 $a(CaSebORM)1597491047 035 $a(MiAaPQ)EBC319199 035 $a(PPN)170245802 035 $a(EXLCZ)991000000000298111 100 $a20061211d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography for developers$b[electronic resource] /$fTom St Denis, Simon Johnson 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing, Inc.$dc2007 215 $a1 online resource (449 p.) 300 $aIncludes index. 311 1 $a1-59749-104-7 327 $aFront Cover; Cryptography for Developers; Copyright Page; Contents; Preface; Chapter 1. Introduction; Introduction; Threat Models; What Is Cryptography?; Asset Management; Common Wisdom; Developer Tools; Summary; Organization; Frequently Asked Questions; Chapter 2. ASN.1 Encoding; Overview of ASN.1; ASN.1 Syntax; ASN.1 Data Types; ASN.1 Length Encodings; ASN. 1 Boolean Type; ASN.1 Integer Type; ASN.1 BIT STRING Type; ASN.1 OCTET STRING Type; ASN.1 NULL Type; ASN.1 OBJECT IDENTIFIER Type; ASN.1 SEQUENCE and SET Types; ASN.1 PrintableString and IA5STRING Types; ASN.1 UTCTIME Type 327 $aIniplementationASN.1 Length Routines; ASN.1 Primitive Encoders; Putting It All Together; Frequently Asked Questions; Chapter 3. Random Number Generation; Introduction; Measuring Entropy; How Bad Can It Be?; RNG Design; PRNG Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 4. Advanced Encryption Standard; Introduction; Implementation; Practical Attacks; Chaining Modes; Putting It All Together; Frequently Asked Questions; Chapter 5. Hash Functions; Introduction; Designs of SHS and Implementation; PKCS # 5 Key Derivation; Putting It All Together 327 $aFrequently Asked QuestionsChapter 6. Message-Authentication Code Algorithms; Introduction; Security Guidelines; Standards; Cipher Message Authentication Code; Hash Message Authentication Code; Putting It All Together; Frequently Asked Questions; Chapter 7. Encrypt and Authenticate Modes; Introduction; Design and Implementation; Putting It All Together; Frequently Asked Questions; Chapter 8. Large Integer Arithmetic; Introduction; What Are BigNums?; The Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 9. Public Key Algorithms; Introduction 327 $aGoals of Public Key CryptographyRSA Public Key Cryptography; Elliptic Curve Cryptography; Putting It All Together; Frequently Asked Questions; Index 330 $aThe only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on 606 $aComputer software$xDevelopment 606 $aCryptography 615 0$aComputer software$xDevelopment. 615 0$aCryptography. 676 $a005.8/2 676 $a005.82 700 $aSt. Denis$b Tom$0627563 701 $aJohnson$b Simon$0125487 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784058103321 996 $aCryptography for developers$93677946 997 $aUNINA