Flylib.com
Cryptography in C and C++
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Table of Contents
BackCover
Cryptography in C and C
Preface to the Translation of the Second Edition
Disclaimer
Translator s Note
Preface to the First Edition
Part I: Arithmetic and Number Theory in C
Chapter 1: Introduction
About the Software
Legal Conditions for Using the Software
Contacting the Author
Chapter 2: Number Formats: The Representation of Large Numbers in C
Chapter 3: Interface Semantics
Chapter 4: The Fundamental Operations
4.1 Addition and Subtraction
4.2 Multiplication
4.3 Division with Remainder
Chapter 5: Modular Arithmetic: Calculating with Residue Classes
Chapter 6: Where All Roads Meet: Modular Exponentiation
6.1 First Approaches
6.2 M-ary Exponentiation
6.3 Addition Chains and Windows
6.4 Montgomery Reduction and Exponentiation
6.5 Cryptographic Application of Exponentiation
Chapter 7: Bitwise and Logical Functions
7.1 Shift Operations
7.2 All or Nothing: Bitwise Relations
7.3 Direct Access to Individual Binary Digits
7.4 Comparison Operators
Chapter 8: Input, Output, Assignment, Conversion
Chapter 9: Dynamic Registers
Chapter 10: Basic Number-Theoretic Functions
10.1 Greatest Common Divisor
10.2 Multiplicative Inverse in Residue Class Rings
10.3 Roots and Logarithms
10.4 Square Roots in Residue Class Rings
10.5 A Primality Test
Chapter 11: Large Random Numbers
Chapter 12: Strategies for Testing LINT
12.1 Static Analysis
12.2 Run-Time Tests
Part II: Arithmetic in C with the Class LINT
Chapter 13: Let C Simplify Your Life
13.1 Not a Public Affair: The Representation of Numbers in LINT
13.2 Constructors
13.3 Overloaded Operators
Chapter 14: The LINT Public Interface: Members and Friends
14.1 Arithmetic
14.2 Number Theory
14.3 Stream IO of LINT Objects
Chapter 15: Error Handling
15.2 User-Defined Error Handling
15.3 LINT Exceptions
Chapter 16: An Application Example: The RSA Cryptosystem
16.1 Asymmetric Cryptosystems
16.2 The RSA Algorithm
16.3 Digital RSA Signatures
16.4 RSA Classes in C
Chapter 17: Do It Yourself: Test LINT
Chapter 18: Approaches for Further Extensions
Chapter 19: Rijndael: A Successor to the Data Encryption Standard
19.1 Arithmetic with Polynomials
19.2 The Rijndael Algorithm
19.3 Calculating the Round Key
19.4 The S-Box
19.5 The ShiftRow Transformation
19.6 The MixColumn Transformation
19.7 The AddRoundKey Step
19.8 Encryption of a Block as a Complete Process
19.9 Decryption
Part III: Appendices
Appendix A: Directory of C Functions
A.2 Basic Calculations
A.3 Modular Arithmetic
A.4 Bitwise Operations
A.5 Number-Theoretic Functions
A.6 Generation of Pseudorandom Numbers
A.7 Register Management
Appendix B: Directory of C Functions
B.2 InputOutput, Conversion, Comparison: Friend Functions
B.3 Basic Operations: Member Functions
B.4 Basic Operations: Friend Functions
B.5 Modular Arithmetic: Member Functions
B.6 Modular Arithmetic: Friend Functions
B.7 Bitwise Operations: Member Functions
B.8 Bitwise Operations: Friend Functions
B.9 Number-Theoretic Member Functions
B.10 Number-Theoretic Friend Functions
B.11 Generation of Pseudorandom Numbers
B.12 Miscellaneous Functions
Appendix C: Macros
C.2 Additional Constants
C.3 Macros with Parameters
Appendix D: Calculation Times
Appendix E: Notation
Appendix F: Arithmetic and Number-Theoretic Packages
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Listings
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Querying Data Asynchronously with Message Queuing
Localizing Client-Side Data in a Web Forms Application
Using Manual Transactions
Filling a DataSet Asynchronously
A.7. Enumerations
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Understanding the IT Security Process
Putting Together a Toolkit
Document Tracking Form
Conclusions
101 Microsoft Visual Basic .NET Applications
Data Access
Building Web Applications
Working with Console Applications
Visual Studio .NET
Securing Applications
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
Rethinking Efficient Replenishment in the Grocery Sector
Transforming Technologies: Retail Exchanges and RFID
Junos Cookbook (Cookbooks (OReilly))
Activating the Router Configuration
Gathering Information Before Contacting Support
Creating a Login Banner
Enabling OSPF Authentication
Diagnosing TCP Session Problems
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies