Mostrando 7,661 - 7,680 Resultados de 8,979 Para Buscar 'Ciper~', tiempo de consulta: 1.00s Limitar resultados
  1. 7661
    por Mattingly, Garrett, 1900-1962
    Publicado 1960
    Libro
  2. 7662
    por Steinitzer, Alfred, 1862-1938
    Publicado 1911
    Libro
  3. 7663
    por Steinitzer, Alfred, 1862-1938
    Publicado 1925
    Libro
  4. 7664
    por Zahrnt, Heinz
    Publicado 1972
    Libro
  5. 7665
    por Vossler, Karl, 1872-1949
    Publicado 1938
    Libro
  6. 7666
    por Jens, Walter, 1923-2013
    Publicado 1962
    Libro
  7. 7667
    Publicado 1973
    Libro
  8. 7668
    Publicado 1985
    Libro
  9. 7669
    Publicado 2012
    991004832869706719
  10. 7670
    Publicado 1921
    Libro
  11. 7671
    Publicado 1921
    Libro
  12. 7672
    Publicado 1921
    Libro
  13. 7673
    por Hübscher, Arthur, 1897-1985
    Publicado 1958
    Libro
  14. 7674
    por Raffalt, Reinhard
    Publicado 1973
    Libro
  15. 7675
    por Newberg, Andrew B., 1966-
    Publicado 2003
    Libro
  16. 7676
  17. 7677
    por Jens, Walter, 1923-2013
    Publicado 1995
    Libro
  18. 7678
    por Ziegler, Jean, 1934-
    Publicado 1992
    Libro
  19. 7679
    Publicado 1993
    Libro
  20. 7680
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK 17: New Features -- Conclusion -- References -- Chapter 3: Roadmap and Vision for Jakarta EE 10 -- Conclusion -- References -- Chapter 4: Java Cryptography Architecture -- Architecture and Design Principles -- JCA Classes and Algorithms -- Algorithms and Engine Classes -- Interfaces and Main Classes -- Data Encryption -- Hash Functions -- Signatures -- Generating Signatures -- Verifying the Signature -- Conclusion -- References -- Chapter 5: Classical Cryptography -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill Cipher -- Implementation -- Cryptanalysis -- Conclusion -- References -- Chapter 6: Formal Techniques for Cryptography -- Definitions -- Probabilities and Statistics -- Conditional Probability -- Random Variables -- Entropy -- A Little Algebra -- Elliptic Curves -- Conclusion -- References -- Chapter 7: Pseudorandom Number Generators -- Examples of PRNGs -- Linear Congruential PRNGs -- Blum-Blum-Shub PRNG -- Linear Circuit PRNGs -- Other PRNGs -- PRNGs Security -- Java.util.Random Class -- Conclusion -- References -- Chapter 8: Hash Functions -- Conclusion -- References -- Chapter 9: Symmetric Encryption Algorithms -- Data Encryption Standard -- The Generation of Keys -- Encryption and Decryption Process -- Operation Modes for DES -- Advanced Encryption Standard -- Encryption and Decryption Process -- Operation Modes for AES -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- The Knapsack Approach -- Algorithms -- Conclusion -- References -- Chapter 11: Signature Schemes -- Conclusion -- References…”
    Libro electrónico