Flylib.com
Cryptography in C and C++
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Table of Contents
BackCover
Cryptography in C and C
Preface to the Translation of the Second Edition
Disclaimer
Translator s Note
Preface to the First Edition
Part I: Arithmetic and Number Theory in C
Chapter 1: Introduction
About the Software
Legal Conditions for Using the Software
Contacting the Author
Chapter 2: Number Formats: The Representation of Large Numbers in C
Chapter 3: Interface Semantics
Chapter 4: The Fundamental Operations
4.1 Addition and Subtraction
4.2 Multiplication
4.3 Division with Remainder
Chapter 5: Modular Arithmetic: Calculating with Residue Classes
Chapter 6: Where All Roads Meet: Modular Exponentiation
6.1 First Approaches
6.2 M-ary Exponentiation
6.3 Addition Chains and Windows
6.4 Montgomery Reduction and Exponentiation
6.5 Cryptographic Application of Exponentiation
Chapter 7: Bitwise and Logical Functions
7.1 Shift Operations
7.2 All or Nothing: Bitwise Relations
7.3 Direct Access to Individual Binary Digits
7.4 Comparison Operators
Chapter 8: Input, Output, Assignment, Conversion
Chapter 9: Dynamic Registers
Chapter 10: Basic Number-Theoretic Functions
10.1 Greatest Common Divisor
10.2 Multiplicative Inverse in Residue Class Rings
10.3 Roots and Logarithms
10.4 Square Roots in Residue Class Rings
10.5 A Primality Test
Chapter 11: Large Random Numbers
Chapter 12: Strategies for Testing LINT
12.1 Static Analysis
12.2 Run-Time Tests
Part II: Arithmetic in C with the Class LINT
Chapter 13: Let C Simplify Your Life
13.1 Not a Public Affair: The Representation of Numbers in LINT
13.2 Constructors
13.3 Overloaded Operators
Chapter 14: The LINT Public Interface: Members and Friends
14.1 Arithmetic
14.2 Number Theory
14.3 Stream IO of LINT Objects
Chapter 15: Error Handling
15.2 User-Defined Error Handling
15.3 LINT Exceptions
Chapter 16: An Application Example: The RSA Cryptosystem
16.1 Asymmetric Cryptosystems
16.2 The RSA Algorithm
16.3 Digital RSA Signatures
16.4 RSA Classes in C
Chapter 17: Do It Yourself: Test LINT
Chapter 18: Approaches for Further Extensions
Chapter 19: Rijndael: A Successor to the Data Encryption Standard
19.1 Arithmetic with Polynomials
19.2 The Rijndael Algorithm
19.3 Calculating the Round Key
19.4 The S-Box
19.5 The ShiftRow Transformation
19.6 The MixColumn Transformation
19.7 The AddRoundKey Step
19.8 Encryption of a Block as a Complete Process
19.9 Decryption
Part III: Appendices
Appendix A: Directory of C Functions
A.2 Basic Calculations
A.3 Modular Arithmetic
A.4 Bitwise Operations
A.5 Number-Theoretic Functions
A.6 Generation of Pseudorandom Numbers
A.7 Register Management
Appendix B: Directory of C Functions
B.2 InputOutput, Conversion, Comparison: Friend Functions
B.3 Basic Operations: Member Functions
B.4 Basic Operations: Friend Functions
B.5 Modular Arithmetic: Member Functions
B.6 Modular Arithmetic: Friend Functions
B.7 Bitwise Operations: Member Functions
B.8 Bitwise Operations: Friend Functions
B.9 Number-Theoretic Member Functions
B.10 Number-Theoretic Friend Functions
B.11 Generation of Pseudorandom Numbers
B.12 Miscellaneous Functions
Appendix C: Macros
C.2 Additional Constants
C.3 Macros with Parameters
Appendix D: Calculation Times
Appendix E: Notation
Appendix F: Arithmetic and Number-Theoretic Packages
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Listings
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
The Object-Oriented Development Process
Model Assumptions
In-Process Metrics and Quality Management
Audit and Assessment
A Project Assessment Questionnaire
MySQL Clustering
Upgrading MySQL Cluster
Backup and Recovery
Physical Factors
Common Setups
Logging Commands
Data Structures and Algorithms in Java
Summary
Vocabulary
Vocabulary
Interacting with Files
A.2. Variables and Types
Twisted Network Programming Essentials
Finding Answers to Your Questions
Using the REST Architecture for Web Services
Authenticating Against a Database Table
Managing Multiple Services
Logging Events and Errors
Comparing, Designing, and Deploying VPNs
What Is a Virtual Private Network?
Deploying MPLS Layer 3 VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Programming .Net Windows Applications
Control Class
Managed Providers
Data Reader
Creating a DataGrid
Updating ADO.NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies