(gcrypt.info.gz) Public Key cryptography (I)
Info Catalog
(gcrypt.info.gz) Hashing
(gcrypt.info.gz) Top
(gcrypt.info.gz) Public Key cryptography (II)
7 Public Key cryptography (I)
*****************************
Public key cryptography, also known as asymmetric cryptography, is an
easy way for key management and to provide digital signatures.
Libgcrypt provides two completely different interfaces to public key
cryptography, this chapter explains the one based on S-expressions.
Menu
* Available algorithms Algorithms supported by the library.
* Used S-expressions Introduction into the used S-expression.
* Public key modules How to work with public key modules.
* Cryptographic Functions Functions for performing the cryptographic actions.
* General public-key related Functions General functions, not implementing any cryptography.
Info Catalog
(gcrypt.info.gz) Hashing
(gcrypt.info.gz) Top
(gcrypt.info.gz) Public Key cryptography (II)
automatically generated byinfo2html