Pro cryptography and cryptanalysis with C++20: creating and programming advanced algorithms
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchabl...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
[Berkeley, California]
Apress
[2021]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781484265864/?ar |
Summary: | Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken. |
Item Description: | Includes bibliographical references and index |
Physical Description: | 1 Online-Ressource |
ISBN: | 9781484265864 1484265866 1484265874 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-061577111 | ||
003 | DE-627-1 | ||
005 | 20240228121258.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210216s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781484265864 |c electronic bk. |9 978-1-4842-6586-4 | ||
020 | |a 1484265866 |c electronic bk. |9 1-4842-6586-6 | ||
020 | |a 1484265874 |9 1-4842-6587-4 | ||
035 | |a (DE-627-1)061577111 | ||
035 | |a (DE-599)KEP061577111 | ||
035 | |a (ORHE)9781484265864 | ||
035 | |a (DE-627-1)061577111 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a U. |2 bicssc | |
072 | 7 | |a COM000000. |2 bisacsh | |
082 | 0 | |a 005.8/24 |2 23 | |
100 | 1 | |a Mihailescu, Marius Iulian |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Pro cryptography and cryptanalysis with C++20 |b creating and programming advanced algorithms |c Marius Iulian Mihailescu, Stefania Loredana Nita |
264 | 1 | |a [Berkeley, California] |b Apress |c [2021] | |
264 | 4 | |c ©2021 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken. | ||
650 | 0 | |a Cryptography |x Data processing | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a C++ (Computer program language) | |
650 | 4 | |a Cryptographie ; Informatique | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a C++ (Langage de programmation) | |
650 | 4 | |a C++ (Computer program language) | |
650 | 4 | |a Cryptography ; Data processing | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Nita, Stefania Loredana |e VerfasserIn |4 aut | |
776 | 1 | |z 1484265858 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1484265858 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484265864/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-061577111 |
---|---|
_version_ | 1829007747493920769 |
adam_text | |
any_adam_object | |
author | Mihailescu, Marius Iulian Nita, Stefania Loredana |
author_facet | Mihailescu, Marius Iulian Nita, Stefania Loredana |
author_role | aut aut |
author_sort | Mihailescu, Marius Iulian |
author_variant | m i m mi mim s l n sl sln |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)061577111 (DE-599)KEP061577111 (ORHE)9781484265864 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03264cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-061577111</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121258.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210216s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484265864</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-6586-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484265866</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-6586-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484265874</subfield><subfield code="9">1-4842-6587-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)061577111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP061577111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484265864</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)061577111</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">U.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM000000.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mihailescu, Marius Iulian</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pro cryptography and cryptanalysis with C++20</subfield><subfield code="b">creating and programming advanced algorithms</subfield><subfield code="c">Marius Iulian Mihailescu, Stefania Loredana Nita</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berkeley, California]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">C++ (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie ; Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">C++ (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">C++ (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography ; Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nita, Stefania Loredana</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1484265858</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1484265858</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484265864/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-061577111 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:13Z |
institution | BVB |
isbn | 9781484265864 1484265866 1484265874 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Apress |
record_format | marc |
spelling | Mihailescu, Marius Iulian VerfasserIn aut Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms Marius Iulian Mihailescu, Stefania Loredana Nita [Berkeley, California] Apress [2021] ©2021 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken. Cryptography Data processing Data encryption (Computer science) C++ (Computer program language) Cryptographie ; Informatique Chiffrement (Informatique) C++ (Langage de programmation) Cryptography ; Data processing Nita, Stefania Loredana VerfasserIn aut 1484265858 Erscheint auch als Druck-Ausgabe 1484265858 |
spellingShingle | Mihailescu, Marius Iulian Nita, Stefania Loredana Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms Cryptography Data processing Data encryption (Computer science) C++ (Computer program language) Cryptographie ; Informatique Chiffrement (Informatique) C++ (Langage de programmation) Cryptography ; Data processing |
title | Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms |
title_auth | Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms |
title_exact_search | Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms |
title_full | Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms Marius Iulian Mihailescu, Stefania Loredana Nita |
title_fullStr | Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms Marius Iulian Mihailescu, Stefania Loredana Nita |
title_full_unstemmed | Pro cryptography and cryptanalysis with C++20 creating and programming advanced algorithms Marius Iulian Mihailescu, Stefania Loredana Nita |
title_short | Pro cryptography and cryptanalysis with C++20 |
title_sort | pro cryptography and cryptanalysis with c 20 creating and programming advanced algorithms |
title_sub | creating and programming advanced algorithms |
topic | Cryptography Data processing Data encryption (Computer science) C++ (Computer program language) Cryptographie ; Informatique Chiffrement (Informatique) C++ (Langage de programmation) Cryptography ; Data processing |
topic_facet | Cryptography Data processing Data encryption (Computer science) C++ (Computer program language) Cryptographie ; Informatique Chiffrement (Informatique) C++ (Langage de programmation) Cryptography ; Data processing |
work_keys_str_mv | AT mihailescumariusiulian procryptographyandcryptanalysiswithc20creatingandprogrammingadvancedalgorithms AT nitastefanialoredana procryptographyandcryptanalysiswithc20creatingandprogrammingadvancedalgorithms |