Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptography and cryptanalysis in Ja...
~
Nita, Stefania Loredana.
Linked to FindBook
Google Book
Amazon
博客來
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cryptography and cryptanalysis in Java/ by Stefania Loredana Nita, Marius Iulian Mihailescu.
Reminder of title:
creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
Author:
Nita, Stefania Loredana.
other author:
Mihailescu, Marius Iulian.
Published:
Berkeley, CA :Apress : : 2022.,
Description:
xi, 227 p. :ill., digital ;24 cm.
[NT 15003449]:
1. Introduction -- 2. JDK 17: Java 17 New Features -- 3. Road and Vision for Jakarta EE 10 -- 4. Java Cryptography Architecture -- 5. Classical Cryptography -- 6. Formal Techniques for Cryptography -- 7. Pseudo-random Number Generators -- 8. Hash Functions -- 9. Symmetric Encryption Algorithms -- 10. Asymmetric Encryption Schemes -- 11. Signature Schemes -- 12. Identification Schemes -- 13. Lattice-based Cryptography and NTRU -- 14. Advanced Encryption Schemes -- 15. Cryptography Tools.
Contained By:
Springer Nature eBook
Subject:
Java (Computer program language) -
Online resource:
https://doi.org/10.1007/978-1-4842-8105-5
ISBN:
9781484281055
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
Nita, Stefania Loredana.
Cryptography and cryptanalysis in Java
creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /[electronic resource] :by Stefania Loredana Nita, Marius Iulian Mihailescu. - Berkeley, CA :Apress :2022. - xi, 227 p. :ill., digital ;24 cm.
1. Introduction -- 2. JDK 17: Java 17 New Features -- 3. Road and Vision for Jakarta EE 10 -- 4. Java Cryptography Architecture -- 5. Classical Cryptography -- 6. Formal Techniques for Cryptography -- 7. Pseudo-random Number Generators -- 8. Hash Functions -- 9. Symmetric Encryption Algorithms -- 10. Asymmetric Encryption Schemes -- 11. Signature Schemes -- 12. Identification Schemes -- 13. Lattice-based Cryptography and NTRU -- 14. Advanced Encryption Schemes -- 15. Cryptography Tools.
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations) Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more.
ISBN: 9781484281055
Standard No.: 10.1007/978-1-4842-8105-5doiSubjects--Topical Terms:
522522
Java (Computer program language)
LC Class. No.: QA76.73.J38 / N57 2022
Dewey Class. No.: 005.133
Cryptography and cryptanalysis in Java = creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
LDR
:03175nmm a2200325 a 4500
001
2300981
003
DE-He213
005
20220415131831.0
006
m d
007
cr nn 008maaau
008
230324s2022 cau s 0 eng d
020
$a
9781484281055
$q
(electronic bk.)
020
$a
9781484281048
$q
(paper)
024
7
$a
10.1007/978-1-4842-8105-5
$2
doi
035
$a
978-1-4842-8105-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.73.J38
$b
N57 2022
072
7
$a
UMX
$2
bicssc
072
7
$a
COM051280
$2
bisacsh
072
7
$a
UMX
$2
thema
082
0 4
$a
005.133
$2
23
090
$a
QA76.73.J38
$b
N728 2022
100
1
$a
Nita, Stefania Loredana.
$3
3259304
245
1 0
$a
Cryptography and cryptanalysis in Java
$h
[electronic resource] :
$b
creating and programming advanced algorithms with Java SE 17 LTS and Jakarta EE 10 /
$c
by Stefania Loredana Nita, Marius Iulian Mihailescu.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
xi, 227 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Introduction -- 2. JDK 17: Java 17 New Features -- 3. Road and Vision for Jakarta EE 10 -- 4. Java Cryptography Architecture -- 5. Classical Cryptography -- 6. Formal Techniques for Cryptography -- 7. Pseudo-random Number Generators -- 8. Hash Functions -- 9. Symmetric Encryption Algorithms -- 10. Asymmetric Encryption Schemes -- 11. Signature Schemes -- 12. Identification Schemes -- 13. Lattice-based Cryptography and NTRU -- 14. Advanced Encryption Schemes -- 15. Cryptography Tools.
520
$a
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations) Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more.
650
0
$a
Java (Computer program language)
$3
522522
650
0
$a
Cryptography.
$3
532586
650
0
$a
Computer security.
$3
540555
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Java.
$3
517732
650
2 4
$a
Programming Language.
$3
3538935
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Science.
$3
626642
650
2 4
$a
Computational Mathematics and Numerical Analysis.
$3
891040
650
2 4
$a
Algorithms.
$3
536374
700
1
$a
Mihailescu, Marius Iulian.
$3
3488196
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-8105-5
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9442873
電子資源
11.線上閱覽_V
電子書
EB QA76.73.J38 N57 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login