Flylib.com
Cryptography in C and C++
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Table of Contents
BackCover
Cryptography in C and C
Preface to the Translation of the Second Edition
Disclaimer
Translator s Note
Preface to the First Edition
Part I: Arithmetic and Number Theory in C
Chapter 1: Introduction
About the Software
Legal Conditions for Using the Software
Contacting the Author
Chapter 2: Number Formats: The Representation of Large Numbers in C
Chapter 3: Interface Semantics
Chapter 4: The Fundamental Operations
4.1 Addition and Subtraction
4.2 Multiplication
4.3 Division with Remainder
Chapter 5: Modular Arithmetic: Calculating with Residue Classes
Chapter 6: Where All Roads Meet: Modular Exponentiation
6.1 First Approaches
6.2 M-ary Exponentiation
6.3 Addition Chains and Windows
6.4 Montgomery Reduction and Exponentiation
6.5 Cryptographic Application of Exponentiation
Chapter 7: Bitwise and Logical Functions
7.1 Shift Operations
7.2 All or Nothing: Bitwise Relations
7.3 Direct Access to Individual Binary Digits
7.4 Comparison Operators
Chapter 8: Input, Output, Assignment, Conversion
Chapter 9: Dynamic Registers
Chapter 10: Basic Number-Theoretic Functions
10.1 Greatest Common Divisor
10.2 Multiplicative Inverse in Residue Class Rings
10.3 Roots and Logarithms
10.4 Square Roots in Residue Class Rings
10.5 A Primality Test
Chapter 11: Large Random Numbers
Chapter 12: Strategies for Testing LINT
12.1 Static Analysis
12.2 Run-Time Tests
Part II: Arithmetic in C with the Class LINT
Chapter 13: Let C Simplify Your Life
13.1 Not a Public Affair: The Representation of Numbers in LINT
13.2 Constructors
13.3 Overloaded Operators
Chapter 14: The LINT Public Interface: Members and Friends
14.1 Arithmetic
14.2 Number Theory
14.3 Stream IO of LINT Objects
Chapter 15: Error Handling
15.2 User-Defined Error Handling
15.3 LINT Exceptions
Chapter 16: An Application Example: The RSA Cryptosystem
16.1 Asymmetric Cryptosystems
16.2 The RSA Algorithm
16.3 Digital RSA Signatures
16.4 RSA Classes in C
Chapter 17: Do It Yourself: Test LINT
Chapter 18: Approaches for Further Extensions
Chapter 19: Rijndael: A Successor to the Data Encryption Standard
19.1 Arithmetic with Polynomials
19.2 The Rijndael Algorithm
19.3 Calculating the Round Key
19.4 The S-Box
19.5 The ShiftRow Transformation
19.6 The MixColumn Transformation
19.7 The AddRoundKey Step
19.8 Encryption of a Block as a Complete Process
19.9 Decryption
Part III: Appendices
Appendix A: Directory of C Functions
A.2 Basic Calculations
A.3 Modular Arithmetic
A.4 Bitwise Operations
A.5 Number-Theoretic Functions
A.6 Generation of Pseudorandom Numbers
A.7 Register Management
Appendix B: Directory of C Functions
B.2 InputOutput, Conversion, Comparison: Friend Functions
B.3 Basic Operations: Member Functions
B.4 Basic Operations: Friend Functions
B.5 Modular Arithmetic: Member Functions
B.6 Modular Arithmetic: Friend Functions
B.7 Bitwise Operations: Member Functions
B.8 Bitwise Operations: Friend Functions
B.9 Number-Theoretic Member Functions
B.10 Number-Theoretic Friend Functions
B.11 Generation of Pseudorandom Numbers
B.12 Miscellaneous Functions
Appendix C: Macros
C.2 Additional Constants
C.3 Macros with Parameters
Appendix D: Calculation Times
Appendix E: Notation
Appendix F: Arithmetic and Number-Theoretic Packages
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Listings
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring ROI in E-Commerce Applications: Analysis to Action
Governance Structures for IT in the Health Care Industry
Documenting Software Architectures: Views and Beyond
Elements, Relations, and Properties of the C&C Viewtype
Shared-Data Style
Implementation Style
ANSI/IEEE-1471-2000
A Final Word
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
A (Very) Short Introduction to Transaction Processing
Object IDs (OID)
Client 4An Interactive Query Processor
Running PostgreSQL on a Windows Host
Securing Network Access
Programming Microsoft ASP.NET 3.5
Paging Through Data Sources
Real-World Data Access
Configuration and Deployment
ASP.NET Security
Hosting ASP.NET Outside IIS
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter XII Web Design and E-Commerce
Chapter XV Customer Trust in Online Commerce
Chapter XVII Internet Markets and E-Loyalty
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies