|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1232031128 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
210119t20212021cau ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d EBLCP
|d GZM
|d OCLCQ
|d OCLCO
|d LDP
|d DCT
|d ERF
|d OCLCF
|d GW5XE
|d VT2
|d N$T
|d UKAHL
|d K6U
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1232279537
|a 1238202214
|a 1238204723
|a 1238205989
|a 1240512895
|
020 |
|
|
|a 9781484265864
|q (electronic bk.)
|
020 |
|
|
|a 1484265866
|q (electronic bk.)
|
020 |
|
|
|a 9781484265871
|q (print)
|
020 |
|
|
|a 1484265874
|
020 |
|
|
|z 1484265858
|
020 |
|
|
|z 9781484265857
|
024 |
7 |
|
|a 10.1007/978-1-4842-6586-4
|2 doi
|
029 |
1 |
|
|a AU@
|b 000068589148
|
029 |
1 |
|
|a AU@
|b 000068857456
|
029 |
1 |
|
|a AU@
|b 000068987994
|
035 |
|
|
|a (OCoLC)1232031128
|z (OCoLC)1232279537
|z (OCoLC)1238202214
|z (OCoLC)1238204723
|z (OCoLC)1238205989
|z (OCoLC)1240512895
|
037 |
|
|
|b Springer
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a U.
|2 bicssc
|
072 |
|
7 |
|a COM000000.
|2 bisacsh
|
072 |
|
7 |
|a UX.
|2 thema
|
082 |
0 |
4 |
|a 005.8/24
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mihailescu, Marius Iulian,
|e author.
|
245 |
1 |
0 |
|a Pro cryptography and cryptanalysis with C++20 :
|b creating and programming advanced algorithms /
|c Marius Iulian Mihailescu, Stefania Loredana Nita.
|
264 |
|
1 |
|a [Berkeley, California] :
|b Apress,
|c [2021]
|
264 |
|
4 |
|c Ã2021
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
520 |
|
|
|a Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken.
|
505 |
0 |
|
|a Part I: Foundations -- 1: Introduction -- 2: Cryptography Fundamentals -- 3: Mathematical Background and Its Applicability -- 4: Large Integer Arithmetic -- 5: Floating Point Arithmetic -- 6: New Features in C++20 -- 7: Secure Coding Guidelines -- 8: Cryptography Libraries in C/C++20 -- Part II: Pro Cryptography -- 9: Elliptic Curve Cryptography -- 10: Lattice-based Cryptography -- 11: Searchable Encryption -- 12: Homomorphic Encryption -- 13: (Ring) Learning with Errors Cryptography -- 14: Chaos-based Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17: Getting Started with Cryptanalysis -- 18: Cryptanalysis Attacks and Techniques -- 19: Linear and Differential Cryptanalysis -- 20: Integral Cryptanalysis -- 21: Brute Force and Buffer Overflow Attacks -- 22: Text Characterization -- 23: Implementation and Practical Approach of Cryptanalysis Methods.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cryptography
|x Data processing.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a C++ (Computer program language)
|
650 |
|
6 |
|a Cryptographie
|x Informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a C++ (Langage de programmation)
|
650 |
|
7 |
|a C++ (Computer program language)
|2 fast
|0 (OCoLC)fst00843286
|
650 |
|
7 |
|a Cryptography
|x Data processing.
|2 fast
|0 (OCoLC)fst00884553
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
700 |
1 |
|
|a Nita, Stefania Loredana,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Mihailescu, Marius Iulian.
|t Pro cryptography and cryptanalysis with C++20.
|d [Berkeley, California] : Apress, [2021]
|z 1484265858
|z 9781484265857
|w (OCoLC)1197843609
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484265864/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38714804
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6458039
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301887314
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2730902
|
994 |
|
|
|a 92
|b IZTAP
|