logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Serious Cryptography Jeanphilippe Aumasson Aumasson Jeanphilippe

  • SKU: BELL-35412336
Serious Cryptography Jeanphilippe Aumasson Aumasson Jeanphilippe
$ 31.00 $ 45.00 (-31%)

5.0

78 reviews

Serious Cryptography Jeanphilippe Aumasson Aumasson Jeanphilippe instant download after payment.

Publisher: No Starch Press
File Extension: EPUB
File size: 19.9 MB
Author: Jean-Philippe Aumasson [Aumasson, Jean-Philippe]
ISBN: 35090684
Language: English
Year: 2017

Product desciption

Serious Cryptography Jeanphilippe Aumasson Aumasson Jeanphilippe by Jean-philippe Aumasson [aumasson, Jean-philippe] 35090684 instant download after payment.

Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work.


Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors.


Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related to authentication, integrity, or random number generation. Readers also learn how to avoid common mistakes with implementations, thanks to a section in every chapter that discuss what could go wrong, including horror stories and examples of failures in real applications.

Related Products