(gcrypt.info.gz) Public Key cryptography (II)
Info Catalog
(gcrypt.info.gz) Public Key cryptography (I)
(gcrypt.info.gz) Top
(gcrypt.info.gz) Random Numbers
8 Public Key cryptography (II)
******************************
This chapter documents the alternative interface to asymmetric
cryptography (ac) that is not based on S-expressions, but on native C
data structures. As opposed to the pk interface described in the
former chapter, this one follows an open/use/close paradigm like other
building blocks of the library.
Menu
* Available asymmetric algorithms List of algorithms supported by the library.
* Working with sets of data How to work with sets of data.
* Working with handles How to use handles.
* Working with keys How to work with keys.
* Using cryptographic functions How to perform cryptographic operations.
* Handle-independent functions General functions independent of handles.
Info Catalog
(gcrypt.info.gz) Public Key cryptography (I)
(gcrypt.info.gz) Top
(gcrypt.info.gz) Random Numbers
automatically generated byinfo2html