Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Pro cryptography and cryptanalysis w...
~
Mihailescu, Marius Iulian.
Linked to FindBook
Google Book
Amazon
博客來
Pro cryptography and cryptanalysis with C++20 = creating and programming advanced algorithms /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Pro cryptography and cryptanalysis with C++20/ by Marius Iulian Mihailescu, Stefania Loredana Nita.
Reminder of title:
creating and programming advanced algorithms /
Author:
Mihailescu, Marius Iulian.
other author:
Nita, Stefania Loredana.
Published:
Berkeley, CA :Apress : : 2021.,
Description:
xvii, 469 p. :ill., digital ;24 cm.
[NT 15003449]:
Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: earchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Contained By:
Springer Nature eBook
Subject:
Cryptography - Data processing. -
Online resource:
https://doi.org/10.1007/978-1-4842-6586-4
ISBN:
9781484265864
Pro cryptography and cryptanalysis with C++20 = creating and programming advanced algorithms /
Mihailescu, Marius Iulian.
Pro cryptography and cryptanalysis with C++20
creating and programming advanced algorithms /[electronic resource] :by Marius Iulian Mihailescu, Stefania Loredana Nita. - Berkeley, CA :Apress :2021. - xvii, 469 p. :ill., digital ;24 cm.
Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: earchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken.
ISBN: 9781484265864
Standard No.: 10.1007/978-1-4842-6586-4doiSubjects--Topical Terms:
2184985
Cryptography
--Data processing.
LC Class. No.: QA76.9.D335 / M543 2021
Dewey Class. No.: 005.824
Pro cryptography and cryptanalysis with C++20 = creating and programming advanced algorithms /
LDR
:03317nmm a2200325 a 4500
001
2237782
003
DE-He213
005
20210630162747.0
006
m d
007
cr nn 008maaau
008
211111s2021 cau s 0 eng d
020
$a
9781484265864
$q
(electronic bk.)
020
$a
9781484265857
$q
(paper)
024
7
$a
10.1007/978-1-4842-6586-4
$2
doi
035
$a
978-1-4842-6586-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.D335
$b
M543 2021
072
7
$a
U
$2
bicssc
072
7
$a
COM000000
$2
bisacsh
072
7
$a
UX
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.D335
$b
M636 2021
100
1
$a
Mihailescu, Marius Iulian.
$3
3488196
245
1 0
$a
Pro cryptography and cryptanalysis with C++20
$h
[electronic resource] :
$b
creating and programming advanced algorithms /
$c
by Marius Iulian Mihailescu, Stefania Loredana Nita.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
xvii, 469 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: earchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods.
520
$a
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken.
650
0
$a
Cryptography
$x
Data processing.
$3
2184985
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
C++ (Computer program language)
$3
527229
650
1 4
$a
Professional Computing.
$3
3201325
650
2 4
$a
Programming Languages, Compilers, Interpreters.
$3
891123
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Nita, Stefania Loredana.
$3
3259304
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6586-4
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9399667
電子資源
11.線上閱覽_V
電子書
EB QA76.9.D335 M543 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login