語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Pro Cryptography and Cryptanalysis w...
~
SpringerLink (Online service)
Pro Cryptography and Cryptanalysis with C++20 = Creating and Programming Advanced Algorithms /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Pro Cryptography and Cryptanalysis with C++20/ by Marius Iulian Mihailescu, Stefania Loredana Nita.
其他題名:
Creating and Programming Advanced Algorithms /
作者:
Mihailescu, Marius Iulian.
其他作者:
Nita, Stefania Loredana.
面頁冊數:
XVII, 469 p. 134 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-1-4842-6586-4
ISBN:
9781484265864
Pro Cryptography and Cryptanalysis with C++20 = Creating and Programming Advanced Algorithms /
Mihailescu, Marius Iulian.
Pro Cryptography and Cryptanalysis with C++20
Creating and Programming Advanced Algorithms /[electronic resource] :by Marius Iulian Mihailescu, Stefania Loredana Nita. - 1st ed. 2021. - XVII, 469 p. 134 illus.online resource.
Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: earchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how “bad” cryptography creeps in during implementation and what “good” cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken.
ISBN: 9781484265864
Standard No.: 10.1007/978-1-4842-6586-4doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: QA76.75-.765
Dewey Class. No.: 004
Pro Cryptography and Cryptanalysis with C++20 = Creating and Programming Advanced Algorithms /
LDR
:03608nam a22003855i 4500
001
1051976
003
DE-He213
005
20210623134227.0
007
cr nn 008mamaa
008
220103s2021 xxu| s |||| 0|eng d
020
$a
9781484265864
$9
978-1-4842-6586-4
024
7
$a
10.1007/978-1-4842-6586-4
$2
doi
035
$a
978-1-4842-6586-4
050
4
$a
QA76.75-.765
072
7
$a
U
$2
bicssc
072
7
$a
COM000000
$2
bisacsh
072
7
$a
UX
$2
thema
082
0 4
$a
004
$2
23
100
1
$a
Mihailescu, Marius Iulian.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1352583
245
1 0
$a
Pro Cryptography and Cryptanalysis with C++20
$h
[electronic resource] :
$b
Creating and Programming Advanced Algorithms /
$c
by Marius Iulian Mihailescu, Stefania Loredana Nita.
250
$a
1st ed. 2021.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
XVII, 469 p. 134 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: earchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods.
520
$a
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how “bad” cryptography creeps in during implementation and what “good” cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken.
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Programming Languages, Compilers, Interpreters.
$3
669782
650
1 4
$a
Professional Computing.
$3
1115983
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Programming languages (Electronic computers).
$3
1127615
650
0
$a
Computer software.
$3
528062
700
1
$a
Nita, Stefania Loredana.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1201413
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484265857
776
0 8
$i
Printed edition:
$z
9781484265871
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6586-4
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入