Practical Cryptography For Developers Book

Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Alternatives To Practical Cryptography For Developers Book
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Practical Cryptography For Developers Book3,059
4 months ago49mitCSS
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Tweetnacl Js1,653514,7482,227a month ago26February 10, 20206unlicenseJavaScript
Port of TweetNaCl cryptographic library to JavaScript
Swift Crypto1,343
5 days ago21apache-2.0C
Open-source implementation of a substantial portion of the API of Apple CryptoKit suitable for use on Linux platforms.
Circl1,02593418 days ago55May 02, 202347otherGo
CIRCL: Cloudflare Interoperable Reusable Cryptographic Library
Python Ecdsa8504,7783433 months ago20January 05, 202213otherPython
pure-python ECDSA signature/verification and ECDH key agreement
7 months ago2otherC++
opmsg message encryption
Curve25519 Dalek7222391684 days ago81February 16, 202245otherRust
A pure-Rust implementation of group operations on Ristretto and Curve25519
Crypto Attacks591
13 days ago1mitPython
Python implementations of cryptographic attacks and utilities.
Kyber56488a month ago28August 23, 202243otherGo
Advanced crypto library for the Go language
9 months ago4bsd-3-clauseHaskell
Bulletproofs are short non-interactive zero-knowledge proofs that require no trusted setup
Alternatives To Practical Cryptography For Developers Book
Select To Compare

Alternative Project Comparisons


Warning: this book is not finished! I am still working on some of the chapters. Once it is completed, I will publish it as PDF and EPUB. Be patient.

Practical Cryptography for Developers - Free Book by Svetlin Nakov - front cover

A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption, AEAD, AES-GCM, ChaCha20-Poly1305), asymmetric ciphers and public-key cryptosystems (RSA, ECC, ECIES), elliptic curve cryptography (ECC, secp256k1, curve25519), digital signatures (ECDSA and EdDSA), secure random numbers (PRNG, CSRNG) and quantum-safe cryptography, along with crypto libraries and developer tools, with a lots of code examples in Python and other languages.

Author: Svetlin Nakov, PhD -

Contributors: Milen Stefanov, Marina Shideroff

Sponsor: SoftUni (Software University) -

ISBN: 978-619-00-0870-5 (9786190008705)

This book is free and open-source, published under the MIT license.

Official Web site:

Official GitHub repo: nakov/practical-cryptography-for-developers-book.

Sofia, November 2018

Tags: cryptography, free, book, Nakov, Svetlin Nakov, hashes, hash function, SHA-256, SHA3, BLAKE2, RIPEMD, MAC, message authentication code, HMAC, KDF, key derivation, key derivation function, PBKDF2, Scrypt, Bcrypt, Argon2, password hashing, random generator, pseudo-random numbers, CSPRNG, secure random generator, key exchange, key agreement, Diffie-Hellman, DHKE, ECDH, symmetric ciphers, asymmetric ciphers, public key cryptosystems, symmetric cryptography, AES, Rijndael, cipher block mode, AES-CTR, AES-GCM, ChaCha20-Poly1305, authenticated encryption, encryption scheme, public key cryptography, RSA, ECC, elliptic curves, secp256k1, curve25519, EC points, EC domain parameters, ECDH key agreement, asymmetric encryption scheme, hybrid encryption, ECIES, digital signature, RSA signature, DSA, ECDSA, EdDSA, ElGammal signature, Schnorr signature, quantum-safe cryptography, digital certificates, TLS, OAuth, multi-factor authentication, crypto libraries, Python cryptography, JavaScript cryptography, C# cryptography, Java cryptography, C++ cryptography, PHP cryptography.

Popular Cryptography Projects
Popular Elliptic Curves Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Elliptic Curves