Flylib.com
Cryptography in C and C++
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
Table of Contents
BackCover
Cryptography in C and C
Preface to the Translation of the Second Edition
Disclaimer
Translator s Note
Preface to the First Edition
Part I: Arithmetic and Number Theory in C
Chapter 1: Introduction
About the Software
Legal Conditions for Using the Software
Contacting the Author
Chapter 2: Number Formats: The Representation of Large Numbers in C
Chapter 3: Interface Semantics
Chapter 4: The Fundamental Operations
4.1 Addition and Subtraction
4.2 Multiplication
4.3 Division with Remainder
Chapter 5: Modular Arithmetic: Calculating with Residue Classes
Chapter 6: Where All Roads Meet: Modular Exponentiation
6.1 First Approaches
6.2 M-ary Exponentiation
6.3 Addition Chains and Windows
6.4 Montgomery Reduction and Exponentiation
6.5 Cryptographic Application of Exponentiation
Chapter 7: Bitwise and Logical Functions
7.1 Shift Operations
7.2 All or Nothing: Bitwise Relations
7.3 Direct Access to Individual Binary Digits
7.4 Comparison Operators
Chapter 8: Input, Output, Assignment, Conversion
Chapter 9: Dynamic Registers
Chapter 10: Basic Number-Theoretic Functions
10.1 Greatest Common Divisor
10.2 Multiplicative Inverse in Residue Class Rings
10.3 Roots and Logarithms
10.4 Square Roots in Residue Class Rings
10.5 A Primality Test
Chapter 11: Large Random Numbers
Chapter 12: Strategies for Testing LINT
12.1 Static Analysis
12.2 Run-Time Tests
Part II: Arithmetic in C with the Class LINT
Chapter 13: Let C Simplify Your Life
13.1 Not a Public Affair: The Representation of Numbers in LINT
13.2 Constructors
13.3 Overloaded Operators
Chapter 14: The LINT Public Interface: Members and Friends
14.1 Arithmetic
14.2 Number Theory
14.3 Stream IO of LINT Objects
Chapter 15: Error Handling
15.2 User-Defined Error Handling
15.3 LINT Exceptions
Chapter 16: An Application Example: The RSA Cryptosystem
16.1 Asymmetric Cryptosystems
16.2 The RSA Algorithm
16.3 Digital RSA Signatures
16.4 RSA Classes in C
Chapter 17: Do It Yourself: Test LINT
Chapter 18: Approaches for Further Extensions
Chapter 19: Rijndael: A Successor to the Data Encryption Standard
19.1 Arithmetic with Polynomials
19.2 The Rijndael Algorithm
19.3 Calculating the Round Key
19.4 The S-Box
19.5 The ShiftRow Transformation
19.6 The MixColumn Transformation
19.7 The AddRoundKey Step
19.8 Encryption of a Block as a Complete Process
19.9 Decryption
Part III: Appendices
Appendix A: Directory of C Functions
A.2 Basic Calculations
A.3 Modular Arithmetic
A.4 Bitwise Operations
A.5 Number-Theoretic Functions
A.6 Generation of Pseudorandom Numbers
A.7 Register Management
Appendix B: Directory of C Functions
B.2 InputOutput, Conversion, Comparison: Friend Functions
B.3 Basic Operations: Member Functions
B.4 Basic Operations: Friend Functions
B.5 Modular Arithmetic: Member Functions
B.6 Modular Arithmetic: Friend Functions
B.7 Bitwise Operations: Member Functions
B.8 Bitwise Operations: Friend Functions
B.9 Number-Theoretic Member Functions
B.10 Number-Theoretic Friend Functions
B.11 Generation of Pseudorandom Numbers
B.12 Miscellaneous Functions
Appendix C: Macros
C.2 Additional Constants
C.3 Macros with Parameters
Appendix D: Calculation Times
Appendix E: Notation
Appendix F: Arithmetic and Number-Theoretic Packages
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Listings
Cryptography in C and C++
ISBN: 189311595X
EAN: 2147483647
Year: 2001
Pages: 127
Authors:
Michael Welschenbach
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
A Hybrid Clustering Technique to Improve Patient Data Quality
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Java for RPG Programmers, 2nd Edition
The World Of Java
Javas Language And Syntax
Structured Operations And Statements
Exceptions
Threads
Visual C# 2005 How to Program (2nd Edition)
Packaging Code in C#
static Methods, static Variables and Class Math
Example: Handling DivideByZeroExceptions and FormatExceptions
Terminology
F.9. Unordered Lists
Competency-Based Human Resource Management
An Overview of Competency-Based HR Management Practices
Competency-Based Performance Management
Competency-Based Employee Development
The Transformation to Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity II
Data Correlation
Incident Response
Security Business Issues
Understanding Digital Signal Processing (2nd Edition)
DFT FREQUENCY AXIS
BILINEAR TRANSFORM IIR FILTER DESIGN METHOD
REPRESENTING REAL SIGNALS USING COMPLEX PHASORS
EFFICIENTLY PERFORMING THE FFT OF REAL SEQUENCES
AUTOMATIC GAIN CONTROL (AGC)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies