Applied cryptanalysis : breaking ciphers in the real world /

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not nece...

Full description

Saved in:
Bibliographic Details
Main Author: Stamp, Mark.
Other Authors: Low, Richard M., 1967-
Format: eBook
Language:English
Published: Hoboken, N.J. : Wiley-Interscience, ©2007.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 02832nam a2200565 a 4500
001 in00006117334
006 m o d
007 cr cn|||||||||
008 071115s2007 njua ob 001 0 eng d
005 20220506185359.3
035 |a (NhCcYBP)5d50d7e5b45a4165915fe73ab9482d3f9780470148778 
035 |a 1wileyeba9780470148778 
040 |a NhCcYBP  |b eng  |c NhCcYBP 
020 |a 9780470148778 
020 |a 0470148772 
020 |a 9780470148761  |q (electronic bk.) 
020 |a 0470148764  |q (electronic bk.) 
020 |a 1280901209 
020 |a 9781280901201 
020 |z 9780470114865  |q (hardcover) 
020 |z 047011486X  |q (hardcover) 
024 7 |a 10.1002/9780470148778  |2 doi 
037 |a 10.1002/9780470148778  |b Wiley InterScience  |n http://www3.interscience.wiley.com 
050 4 |a QA76.9.A25  |b S687 2007 
082 0 4 |a 005.8/2  |2 22 
100 1 |a Stamp, Mark. 
245 1 0 |a Applied cryptanalysis :  |b breaking ciphers in the real world /  |c Mark Stamp, Richard M. Low. 
260 |a Hoboken, N.J. :  |b Wiley-Interscience,  |c ©2007. 
300 |a 1 online resource (xix, 401 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 375-392) and index. 
505 0 |a Classic ciphers -- World War II ciphers -- Stream ciphers -- Block ciphers -- Hash functions -- Public key systems -- Public key attacks. 
520 |a The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. 
590 |a Wiley EBA 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
700 1 |a Low, Richard M.,  |d 1967- 
730 0 |a WILEYEBA 
776 0 8 |i Print version:  |a Stamp, Mark.  |t Applied cryptanalysis.  |d Hoboken, N.J. : Wiley-Interscience, ©2007  |z 9780470114865  |z 047011486X  |w (DLC) 2007001277 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9780470148778  |z CONNECT  |3 Wiley  |t 0 
949 |a ho0 
975 |p Wiley UBCM All Titles thru 2021 
976 |a 6005108 
998 |a wi  |d z 
999 f f |s 83a086e0-15f4-4c2f-8df7-6180449ac5aa  |i 83a086e0-15f4-4c2f-8df7-6180449ac5aa  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e QA76.9.A25 S687 2007  |h Library of Congress classification 
856 4 0 |3 Wiley  |t 0  |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9780470148778  |z CONNECT