cryptobook.nakov.com Open in urlscan Pro
2606:4700:4400::6812:282f  Public Scan

Submitted URL: http://cryptobook.nakov.com/
Effective URL: https://cryptobook.nakov.com/
Submission: On September 27 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

P
P
Practical Cryptography for Developers
SoftUniNakov.com
Search
⌃K

Links
P
P
Practical Cryptography for Developers

Search
⌃K
Welcome
Preface
Cryptography - Overview
Hash Functions

MAC and Key Derivation

Secure Random Generators

Key Exchange and DHKE

Encryption: Symmetric and Asymmetric
Symmetric Key Ciphers

Asymmetric Key Ciphers

Digital Signatures

Quantum-Safe Cryptography

More Cryptographic Concepts

Crypto Libraries for Developers

Conclusion
Powered By GitBook


WELCOME



> Warning: this book is not finished! I am still working on some of the
> chapters. Once it is completed, I will publish it as PDF and EPUB. Be patient.


A modern practical book about cryptography for developers with code examples,
covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like
HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement
protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher
block modes, authenticated encryption, AEAD, AES-GCM, ChaCha20-Poly1305),
asymmetric ciphers and public-key cryptosystems (RSA, ECC, ECIES), elliptic
curve cryptography (ECC, secp256k1, curve25519), digital signatures (ECDSA and
EdDSA), secure random numbers (PRNG, CSRNG) and quantum-safe cryptography, along
with crypto libraries and developer tools, with a lots of code examples in
Python and other languages.
Author: Svetlin Nakov, PhD - https://nakov.com
Contributors: Milen Stefanov, Marina Shideroff
Sponsor: SoftUni (Software University) - https://softuni.org
ISBN: 978-619-00-0870-5 (9786190008705)
This book is free and open-source, published under the MIT license.
Official Web site: https://cryptobook.nakov.com
Official GitHub repo:
https://github.com/nakov/practical-cryptography-for-developers-book.
Sofia, November 2018
Tags: cryptography, free, book, Nakov, Svetlin Nakov, hashes, hash function,
SHA-256, SHA3, BLAKE2, RIPEMD, MAC, message authentication code, HMAC, KDF, key
derivation, key derivation function, PBKDF2, Scrypt, Bcrypt, Argon2, password
hashing, random generator, pseudo-random numbers, CSPRNG, secure random
generator, key exchange, key agreement, Diffie-Hellman, DHKE, ECDH, symmetric
ciphers, asymmetric ciphers, public key cryptosystems, symmetric cryptography,
AES, Rijndael, cipher block mode, AES-CTR, AES-GCM, ChaCha20-Poly1305,
authenticated encryption, encryption scheme, public key cryptography, RSA, ECC,
elliptic curves, secp256k1, curve25519, EC points, EC domain parameters, ECDH
key agreement, asymmetric encryption scheme, hybrid encryption, ECIES, digital
signature, RSA signature, DSA, ECDSA, EdDSA, ElGammal signature, Schnorr
signature, quantum-safe cryptography, digital certificates, TLS, OAuth,
multi-factor authentication, crypto libraries, Python cryptography, JavaScript
cryptography, C# cryptography, Java cryptography, C++ cryptography, PHP
cryptography.
Next
Preface

Last modified 1yr ago
Was this page helpful?


CookiesThis site uses cookies to deliver its service and to analyse traffic. By
browsing this site, you accept the cookie policy.
Reject all


P
P
Practical Cryptography for Developers

Search
⌃K
Welcome
Preface
Cryptography - Overview
Hash Functions

MAC and Key Derivation

Secure Random Generators

Key Exchange and DHKE

Encryption: Symmetric and Asymmetric
Symmetric Key Ciphers

Asymmetric Key Ciphers

Digital Signatures

Quantum-Safe Cryptography

More Cryptographic Concepts

Crypto Libraries for Developers

Conclusion
Powered By GitBook