Flylib.com
Cryptography in C and C++
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Table of Contents
BackCover
Cryptography in C and C
Preface to the Translation of the Second Edition
Disclaimer
Translator s Note
Preface to the First Edition
Part I: Arithmetic and Number Theory in C
Chapter 1: Introduction
About the Software
Legal Conditions for Using the Software
Contacting the Author
Chapter 2: Number Formats: The Representation of Large Numbers in C
Chapter 3: Interface Semantics
Chapter 4: The Fundamental Operations
4.1 Addition and Subtraction
4.2 Multiplication
4.3 Division with Remainder
Chapter 5: Modular Arithmetic: Calculating with Residue Classes
Chapter 6: Where All Roads Meet: Modular Exponentiation
6.1 First Approaches
6.2 M-ary Exponentiation
6.3 Addition Chains and Windows
6.4 Montgomery Reduction and Exponentiation
6.5 Cryptographic Application of Exponentiation
Chapter 7: Bitwise and Logical Functions
7.1 Shift Operations
7.2 All or Nothing: Bitwise Relations
7.3 Direct Access to Individual Binary Digits
7.4 Comparison Operators
Chapter 8: Input, Output, Assignment, Conversion
Chapter 9: Dynamic Registers
Chapter 10: Basic Number-Theoretic Functions
10.1 Greatest Common Divisor
10.2 Multiplicative Inverse in Residue Class Rings
10.3 Roots and Logarithms
10.4 Square Roots in Residue Class Rings
10.5 A Primality Test
Chapter 11: Large Random Numbers
Chapter 12: Strategies for Testing LINT
12.1 Static Analysis
12.2 Run-Time Tests
Part II: Arithmetic in C with the Class LINT
Chapter 13: Let C Simplify Your Life
13.1 Not a Public Affair: The Representation of Numbers in LINT
13.2 Constructors
13.3 Overloaded Operators
Chapter 14: The LINT Public Interface: Members and Friends
14.1 Arithmetic
14.2 Number Theory
14.3 Stream IO of LINT Objects
Chapter 15: Error Handling
15.2 User-Defined Error Handling
15.3 LINT Exceptions
Chapter 16: An Application Example: The RSA Cryptosystem
16.1 Asymmetric Cryptosystems
16.2 The RSA Algorithm
16.3 Digital RSA Signatures
16.4 RSA Classes in C
Chapter 17: Do It Yourself: Test LINT
Chapter 18: Approaches for Further Extensions
Chapter 19: Rijndael: A Successor to the Data Encryption Standard
19.1 Arithmetic with Polynomials
19.2 The Rijndael Algorithm
19.3 Calculating the Round Key
19.4 The S-Box
19.5 The ShiftRow Transformation
19.6 The MixColumn Transformation
19.7 The AddRoundKey Step
19.8 Encryption of a Block as a Complete Process
19.9 Decryption
Part III: Appendices
Appendix A: Directory of C Functions
A.2 Basic Calculations
A.3 Modular Arithmetic
A.4 Bitwise Operations
A.5 Number-Theoretic Functions
A.6 Generation of Pseudorandom Numbers
A.7 Register Management
Appendix B: Directory of C Functions
B.2 InputOutput, Conversion, Comparison: Friend Functions
B.3 Basic Operations: Member Functions
B.4 Basic Operations: Friend Functions
B.5 Modular Arithmetic: Member Functions
B.6 Modular Arithmetic: Friend Functions
B.7 Bitwise Operations: Member Functions
B.8 Bitwise Operations: Friend Functions
B.9 Number-Theoretic Member Functions
B.10 Number-Theoretic Friend Functions
B.11 Generation of Pseudorandom Numbers
B.12 Miscellaneous Functions
Appendix C: Macros
C.2 Additional Constants
C.3 Macros with Parameters
Appendix D: Calculation Times
Appendix E: Notation
Appendix F: Arithmetic and Number-Theoretic Packages
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Listings
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
MySQL Stored Procedure Programming
Parameters
Conclusion
Using Triggers
Executing Stored Programs with DBD::mysql
Tuning Table Access
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Review Questions
Documenting Software Architectures: Views and Beyond
Layered Style
Summary Checklist
Chunking Information: View Packets, Refinement, and Descriptive Completeness
Rational Unified Process/Kruchten 4+1
A Final Word
Network Security Architectures
Security Technologies
Identity Technology Guidelines
Network Design Considerations
Case Studies
Legislation Should Garner Serious Consideration
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Validating Data
Recipe 4-14. Displaying Error Bars
Plotting Time Series Data
Delving into Division
Using a Single Spreadsheet Function for Linear Curve Fitting
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Building Windows Forms User Interfaces
Working with Console Applications
COM Interop/PInvoke
Coding Conventions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies