Description: Applied Cryptography This book s source code, it is difficult to find, using C prepared, well understood
File list (Check if you may need any files):
应用密码学手册的源代码
......................\code of book
......................\............\addchain.c
......................\............\barrett.c
......................\............\binegcd.c
......................\............\bingcd.c
......................\............\blumblum.c
......................\............\chap02.htm
......................\............\chap03.htm
......................\............\chap04.htm
......................\............\chap05.htm
......................\............\chap06.htm
......................\............\chap07.htm
......................\............\chap08.htm
......................\............\chap09.htm
......................\............\chap11.htm
......................\............\chap14.htm
......................\............\cryptocode.htm
......................\............\dlp.c
......................\............\exteuc.c
......................\............\fbcomb.c
......................\............\fermat.c
......................\............\fsroots.c
......................\............\garner.c
......................\............\genirred.c
......................\............\gordon.c
......................\............\index.c
......................\............\intlll.c
......................\............\inverse.c
......................\............\jacobi.c
......................\............\knapsack.c
......................\............\lehmer.c
......................\............\ltrkary.c
......................\............\massey.c
......................\............\maurer.c
......................\............\micali.c
......................\............\miller.c
......................\............\mltrkary.c
......................\............\montexpo.c
......................\............\montmult.c
......................\............\monty.c
......................\............\mpadd.c
......................\............\mpdiv.c
......................\............\mpmul.c
......................\............\mpqs.c
......................\............\mpsqr.c
......................\............\mpsub.c
......................\............\pminone.c
......................\............\polyee.c
......................\............\polyfact.c
......................\............\repeat.c
......................\............\sdrec.c
......................\............\solovay.c
......................\............\sqrtmod.c
......................\............\srk.c
......................\............\swindow.c
......................\crypto
......................\......\blumgold.c
......................\......\dc3.c
......................\......\dc4.c
......................\......\des.c
......................\......\dsa.c
......................\......\elgamal.c
......................\......\esign.c
......................\......\feal_8.c
......................\......\ffs.c
......................\......\gmr.c
......................\......\goldmica.c
......................\......\gq.c
......................\......\idea.c
......................\......\mdc_2.c
......................\......\mdc_4.c
......................\......\mh.c
......................\......\mmohash.c
......................\......\rab.c
......................\......\rabin.c
......................\......\rc5.c
......................\......\rsa.c
......................\......\saferk64.c
......................\......\seal.c
......................\......\sha1.c
......................\......\testdes3.c
......................\freelip_1.1
......................\...........\lip.c
......................\...........\lip.h
......................\...........\lipdoc.pdf
......................\...........\lipdoc.ps
......................\...........\lippar.h
......................\...........\liptimer.c
......................\...........\Makefile
......................\...........\README
......................\...........\TODO