Applied cryptanalysis : breaking ciphers in the real world /
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not nece...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Hoboken, N.J. :
Wiley-Interscience,
©2007.
|
Subjects: | |
Online Access: | CONNECT CONNECT |
LEADER | 02832nam a2200565 a 4500 | ||
---|---|---|---|
001 | in00006117334 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 071115s2007 njua ob 001 0 eng d | ||
005 | 20220506185359.3 | ||
035 | |a (NhCcYBP)5d50d7e5b45a4165915fe73ab9482d3f9780470148778 | ||
035 | |a 1wileyeba9780470148778 | ||
040 | |a NhCcYBP |b eng |c NhCcYBP | ||
020 | |a 9780470148778 | ||
020 | |a 0470148772 | ||
020 | |a 9780470148761 |q (electronic bk.) | ||
020 | |a 0470148764 |q (electronic bk.) | ||
020 | |a 1280901209 | ||
020 | |a 9781280901201 | ||
020 | |z 9780470114865 |q (hardcover) | ||
020 | |z 047011486X |q (hardcover) | ||
024 | 7 | |a 10.1002/9780470148778 |2 doi | |
037 | |a 10.1002/9780470148778 |b Wiley InterScience |n http://www3.interscience.wiley.com | ||
050 | 4 | |a QA76.9.A25 |b S687 2007 | |
082 | 0 | 4 | |a 005.8/2 |2 22 |
100 | 1 | |a Stamp, Mark. | |
245 | 1 | 0 | |a Applied cryptanalysis : |b breaking ciphers in the real world / |c Mark Stamp, Richard M. Low. |
260 | |a Hoboken, N.J. : |b Wiley-Interscience, |c ©2007. | ||
300 | |a 1 online resource (xix, 401 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 375-392) and index. | ||
505 | 0 | |a Classic ciphers -- World War II ciphers -- Stream ciphers -- Block ciphers -- Hash functions -- Public key systems -- Public key attacks. | |
520 | |a The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. | ||
590 | |a Wiley EBA | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Cryptography. | |
700 | 1 | |a Low, Richard M., |d 1967- | |
730 | 0 | |a WILEYEBA | |
776 | 0 | 8 | |i Print version: |a Stamp, Mark. |t Applied cryptanalysis. |d Hoboken, N.J. : Wiley-Interscience, ©2007 |z 9780470114865 |z 047011486X |w (DLC) 2007001277 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9780470148778 |z CONNECT |3 Wiley |t 0 |
949 | |a ho0 | ||
975 | |p Wiley UBCM All Titles thru 2021 | ||
976 | |a 6005108 | ||
998 | |a wi |d z | ||
999 | f | f | |s 83a086e0-15f4-4c2f-8df7-6180449ac5aa |i 83a086e0-15f4-4c2f-8df7-6180449ac5aa |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 1 |e QA76.9.A25 S687 2007 |h Library of Congress classification |
856 | 4 | 0 | |3 Wiley |t 0 |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9780470148778 |z CONNECT |