TY - GEN AB - Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken. AU - Mihailescu, Marius Iulian, AU - Nita, Stefania Loredana, CN - QA76.9.D335 DO - 10.1007/978-1-4842-6586-4 DO - doi ID - 1433505 KW - Cryptography KW - Data encryption (Computer science) KW - C++ (Computer program language) KW - Cryptographie KW - Chiffrement (Informatique) KW - C++ (Langage de programmation) LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-6586-4 N2 - Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice. The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how "bad" cryptography creeps in during implementation and what "good" cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability. You will: Understand where and why cryptography is used and how it gets misused Discover what modern cryptography algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++20 and its new features are impacting the future of implementing cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more Find out how most of the algorithms can be broken. SN - 9781484265864 SN - 1484265866 SN - 9781484265871 SN - 1484265874 T1 - Pro cryptography and cryptanalysis with C++20 :creating and programming advanced algorithms / TI - Pro cryptography and cryptanalysis with C++20 :creating and programming advanced algorithms / UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-6586-4 ER -