語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cryptography and Cryptanalysis in Java = Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cryptography and Cryptanalysis in Java/ by Stefania Loredana Nita, Marius Iulian Mihailescu.
其他題名:
Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /
作者:
Nita, Stefania Loredana.
其他作者:
Mihailescu, Marius Iulian.
面頁冊數:
XI, 227 p. 65 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computational Mathematics and Numerical Analysis. -
電子資源:
https://doi.org/10.1007/978-1-4842-8105-5
ISBN:
9781484281055
Cryptography and Cryptanalysis in Java = Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /
Nita, Stefania Loredana.
Cryptography and Cryptanalysis in Java
Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /[electronic resource] :by Stefania Loredana Nita, Marius Iulian Mihailescu. - 1st ed. 2022. - XI, 227 p. 65 illus.online resource.
1. Introduction -- 2. JDK 17: Java 17 New Features -- 3. Road and Vision for Jakarta EE 10 -- 4. Java Cryptography Architecture -- 5. Classical Cryptography -- 6. Formal Techniques for Cryptography -- 7. Pseudo-random Number Generators -- 8. Hash Functions -- 9. Symmetric Encryption Algorithms -- 10. Asymmetric Encryption Schemes -- 11. Signature Schemes -- 12. Identification Schemes -- 13. Lattice-based Cryptography and NTRU -- 14. Advanced Encryption Schemes -- 15. Cryptography Tools.
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore “good” vs “bad” cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more .
ISBN: 9781484281055
Standard No.: 10.1007/978-1-4842-8105-5doiSubjects--Topical Terms:
669338
Computational Mathematics and Numerical Analysis.
LC Class. No.: QA76.73.J38
Dewey Class. No.: 005.133
Cryptography and Cryptanalysis in Java = Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /
LDR
:03519nam a22003975i 4500
001
1092816
003
DE-He213
005
20221104134203.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484281055
$9
978-1-4842-8105-5
024
7
$a
10.1007/978-1-4842-8105-5
$2
doi
035
$a
978-1-4842-8105-5
050
4
$a
QA76.73.J38
072
7
$a
UMX
$2
bicssc
072
7
$a
COM051280
$2
bisacsh
072
7
$a
UMX
$2
thema
082
0 4
$a
005.133
$2
23
100
1
$a
Nita, Stefania Loredana.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1201413
245
1 0
$a
Cryptography and Cryptanalysis in Java
$h
[electronic resource] :
$b
Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 /
$c
by Stefania Loredana Nita, Marius Iulian Mihailescu.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XI, 227 p. 65 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
1. Introduction -- 2. JDK 17: Java 17 New Features -- 3. Road and Vision for Jakarta EE 10 -- 4. Java Cryptography Architecture -- 5. Classical Cryptography -- 6. Formal Techniques for Cryptography -- 7. Pseudo-random Number Generators -- 8. Hash Functions -- 9. Symmetric Encryption Algorithms -- 10. Asymmetric Encryption Schemes -- 11. Signature Schemes -- 12. Identification Schemes -- 13. Lattice-based Cryptography and NTRU -- 14. Advanced Encryption Schemes -- 15. Cryptography Tools.
520
$a
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore “good” vs “bad” cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more .
650
2 4
$a
Computational Mathematics and Numerical Analysis.
$3
669338
650
2 4
$a
Computer Science.
$3
593922
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Programming Language.
$3
1365750
650
1 4
$a
Java.
$3
1115949
650
0
$a
Algorithms.
$3
527865
650
0
$a
Mathematics—Data processing.
$3
1365953
650
0
$a
Computer science.
$3
573171
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Cryptography.
$3
567927
650
0
$a
Programming languages (Electronic computers).
$3
1127615
650
0
$a
Java (Computer program language).
$3
686374
700
1
$a
Mihailescu, Marius Iulian.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1352583
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484281048
776
0 8
$i
Printed edition:
$z
9781484281062
776
0 8
$i
Printed edition:
$z
9781484291047
856
4 0
$u
https://doi.org/10.1007/978-1-4842-8105-5
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入