cryptobook.nakov.com
Open in
urlscan Pro
2606:4700:4400::ac40:93d1
Public Scan
Submitted URL: http://cryptobook.nakov.com/
Effective URL: https://cryptobook.nakov.com/
Submission: On December 04 via api from US — Scanned from DE
Effective URL: https://cryptobook.nakov.com/
Submission: On December 04 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
P P Practical Cryptography for Developers SoftUniNakov.com Search ⌃K Links P P Practical Cryptography for Developers Search ⌃K Welcome Preface Cryptography - Overview Hash Functions MAC and Key Derivation Secure Random Generators Key Exchange and DHKE Encryption: Symmetric and Asymmetric Symmetric Key Ciphers Asymmetric Key Ciphers Digital Signatures Quantum-Safe Cryptography More Cryptographic Concepts Crypto Libraries for Developers Conclusion Powered By GitBook Comment on page WELCOME > Warning: this book is not finished! I am still working on some of the > chapters. Once it is completed, I will publish it as PDF and EPUB. Be patient. A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption, AEAD, AES-GCM, ChaCha20-Poly1305), asymmetric ciphers and public-key cryptosystems (RSA, ECC, ECIES), elliptic curve cryptography (ECC, secp256k1, curve25519), digital signatures (ECDSA and EdDSA), secure random numbers (PRNG, CSRNG) and quantum-safe cryptography, along with crypto libraries and developer tools, with a lots of code examples in Python and other languages. Author: Svetlin Nakov, PhD - https://nakov.com Contributors: Milen Stefanov, Marina Shideroff Sponsor: SoftUni (Software University) - https://softuni.org ISBN: 978-619-00-0870-5 (9786190008705) This book is free and open-source, published under the MIT license. Official Web site: https://cryptobook.nakov.com Official GitHub repo: https://github.com/nakov/practical-cryptography-for-developers-book. Sofia, November 2018 Tags: cryptography, free, book, Nakov, Svetlin Nakov, hashes, hash function, SHA-256, SHA3, BLAKE2, RIPEMD, MAC, message authentication code, HMAC, KDF, key derivation, key derivation function, PBKDF2, Scrypt, Bcrypt, Argon2, password hashing, random generator, pseudo-random numbers, CSPRNG, secure random generator, key exchange, key agreement, Diffie-Hellman, DHKE, ECDH, symmetric ciphers, asymmetric ciphers, public key cryptosystems, symmetric cryptography, AES, Rijndael, cipher block mode, AES-CTR, AES-GCM, ChaCha20-Poly1305, authenticated encryption, encryption scheme, public key cryptography, RSA, ECC, elliptic curves, secp256k1, curve25519, EC points, EC domain parameters, ECDH key agreement, asymmetric encryption scheme, hybrid encryption, ECIES, digital signature, RSA signature, DSA, ECDSA, EdDSA, ElGammal signature, Schnorr signature, quantum-safe cryptography, digital certificates, TLS, OAuth, multi-factor authentication, crypto libraries, Python cryptography, JavaScript cryptography, C# cryptography, Java cryptography, C++ cryptography, PHP cryptography. Next Preface Last modified 2yr ago Was this page helpful? To pick up a draggable item, press the space bar. While dragging, use the arrow keys to move the item. Press space again to drop the item in its new position, or press escape to cancel. P P Practical Cryptography for Developers Search ⌃K Welcome Preface Cryptography - Overview Hash Functions MAC and Key Derivation Secure Random Generators Key Exchange and DHKE Encryption: Symmetric and Asymmetric Symmetric Key Ciphers Asymmetric Key Ciphers Digital Signatures Quantum-Safe Cryptography More Cryptographic Concepts Crypto Libraries for Developers Conclusion Powered By GitBook