DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH
 

(gcrypt.info.gz) Public Key cryptography (II)

Info Catalog (gcrypt.info.gz) Public Key cryptography (I) (gcrypt.info.gz) Top (gcrypt.info.gz) Random Numbers
 
 8 Public Key cryptography (II)
 ******************************
 
 This chapter documents the alternative interface to asymmetric
 cryptography (ac) that is not based on S-expressions, but on native C
 data structures.  As opposed to the pk interface described in the
 former chapter, this one follows an open/use/close paradigm like other
 building blocks of the library.
 

Menu

 
* Available asymmetric algorithms  List of algorithms supported by the library.
* Working with sets of data   How to work with sets of data.
* Working with handles        How to use handles.
* Working with keys           How to work with keys.
* Using cryptographic functions  How to perform cryptographic operations.
* Handle-independent functions  General functions independent of handles.
 
Info Catalog (gcrypt.info.gz) Public Key cryptography (I) (gcrypt.info.gz) Top (gcrypt.info.gz) Random Numbers
automatically generated byinfo2html