Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200673Ii 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    220418s2022    nyu     ob    001 0 eng d 
019    1311465865|a1311572569 
020    9781484281055|q(electronic bk.) 
020    1484281055|q(electronic bk.) 
024 7  10.1007/978-1-4842-8105-5|2doi 
029 1  AU@|b000071547491 
029 1  AU@|b000071980592 
035    (OCoLC)1311285711|z(OCoLC)1311465865|z(OCoLC)1311572569 
037    9781484281055|bO'Reilly Media 
040    ORMDA|beng|erda|epn|cORMDA|dEBLCP|dGW5XE|dYDX|dOCLCO|dYDX
       |dOCLCF|dN$T|dK6U|dUKAHL|dOCLCQ|dOCLCO 
049    INap 
082 04 005.13/3 
082 04 005.13/3|223 
099    eBook O'Reilly for Public Libraries 
100 1  Nita, Stefania Loredana,|eauthor. 
245 10 Cryptography and cryptanalysis in Java :|bcreating and 
       programming advanced algorithms with Java SE 17 LTS and 
       Jakarta EE 10 /|cStefania Loredana Nita, Marius Iulian 
       Mihailescu.|h[O'Reilly electronic resource] 
264  1 New York :|bApress,|c[2022] 
300    1 online resource (230 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  Intro -- Table of Contents -- About the Authors -- About 
       the Technical Reviewer -- Chapter 1: Introduction -- 
       Cryptography and Cryptanalysis -- Book Structure -- 
       Conclusion -- References -- Chapter 2: JDK 17: New 
       Features -- Conclusion -- References -- Chapter 3: Roadmap
       and Vision for Jakarta EE 10 -- Conclusion -- References -
       - Chapter 4: Java Cryptography Architecture -- 
       Architecture and Design Principles -- JCA Classes and 
       Algorithms -- Algorithms and Engine Classes -- Interfaces 
       and Main Classes -- Data Encryption -- Hash Functions -- 
       Signatures -- Generating Signatures 
505 8  Verifying the Signature -- Conclusion -- References -- 
       Chapter 5: Classical Cryptography -- Caesar Cipher -- 
       Implementation -- Cryptanalysis -- Vigenère Cipher -- 
       Implementation -- Cryptanalysis -- Hill Cipher -- 
       Implementation -- Cryptanalysis -- Conclusion -- 
       References -- Chapter 6: Formal Techniques for 
       Cryptography -- Definitions -- Probabilities and 
       Statistics -- Conditional Probability -- Random Variables 
       -- Entropy -- A Little Algebra -- Elliptic Curves -- 
       Conclusion -- References -- Chapter 7: Pseudorandom Number
       Generators -- Examples of PRNGs -- Linear Congruential 
       PRNGs 
505 8  Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs
       -- PRNGs Security -- Java.util.Random Class -- Conclusion 
       -- References -- Chapter 8: Hash Functions -- Conclusion -
       - References -- Chapter 9: Symmetric Encryption Algorithms
       -- Data Encryption Standard -- The Generation of Keys -- 
       Encryption and Decryption Process -- Operation Modes for 
       DES -- Advanced Encryption Standard -- Encryption and 
       Decryption Process -- Operation Modes for AES -- 
       Conclusion -- References -- Chapter 10: Asymmetric 
       Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- 
       The Knapsack Approach -- Algorithms 
505 8  Conclusion -- References -- Chapter 11: Signature Schemes 
       -- Conclusion -- References -- Chapter 12: Identification 
       Schemes -- FFS Identification protocol -- Conclusion -- 
       References -- Chapter 13: Lattice-Based Cryptography and 
       NTRU -- Practical Implementation of the NTRU Library -- 
       Conclusion -- References -- Chapter 14: Advanced 
       Encryption Schemes -- Homomorphic Encryption -- Searchable
       Encryption -- Conclusion -- References -- Chapter 15: 
       Cryptography Tools -- CryptTool -- OpenSSL -- Conclusion -
       - References -- Index 
520    Here is your in-depth guide to cryptography and 
       cryptanalysis in Java. This book includes challenging 
       cryptographic solutions that are implemented in Java 17 
       and Jakarta EE 10. It provides a robust introduction to 
       Java 17's new features and updates, a roadmap for Jakarta 
       EE 10 security mechanisms, a unique presentation of the 
       "hot points" (advantages and disadvantages) from the Java 
       Cryptography Architecture (JCA), and more. The book dives 
       into the classical simple cryptosystems that form the 
       basis of modern cryptography, with fully working solutions
       (encryption/decryption operations). Pseudo-random 
       generators are discussed as well as real-life 
       implementations. Hash functions are covered along with 
       practical cryptanalysis methods and attacks, asymmetric 
       and symmetric encryption systems, signature and 
       identification schemes. The book wraps up with a 
       presentation of lattice-based cryptography and the NTRU 
       framework library. Modern encryption schemes for cloud and
       big data environments (homomorphic encryption and 
       searchable encryption) also are included. After reading 
       and using this book, you will be proficient with crypto 
       algorithms and know how to apply them to problems you may 
       encounter. What You Will Learn Develop programming skills 
       for writing cryptography algorithms in Java Dive into 
       security schemes and modules using Java Explore "good" vs 
       "bad" cryptography based on processing execution times and
       reliability Play with pseudo-random generators, hash 
       functions, etc. Leverage lattice-based cryptography 
       methods, the NTRU framework library, and more Who This 
       Book Is For Those who want to learn and leverage 
       cryptography and cryptanalysis using Java. Some prior Java
       and/or algorithm programming exposure is highly 
       recommended. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Java (Computer program language) 
650  0 Cryptography. 
650  0 Computer security. 
650  0 Data encryption (Computer science) 
650  2 Computer Security 
650  6 Java (Langage de programmation) 
650  6 Cryptographie. 
650  6 Sécurité informatique. 
650  6 Chiffrement (Informatique) 
650  7 Computer security|2fast 
650  7 Cryptography|2fast 
650  7 Data encryption (Computer science)|2fast 
650  7 Java (Computer program language)|2fast 
700 1  Mihailescu, Marius Iulian,|eauthor. 
776 08 |iPrint version:|z1484281047|z9781484281048
       |w(OCoLC)1294284912 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781484281055/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH40335697 
938    ProQuest Ebook Central|bEBLB|nEBL6954122 
938    YBP Library Services|bYANK|n17914167 
938    EBSCOhost|bEBSC|n3267271 
994    92|bJFN