Index
A
Ad-hoc techniques
American National Standards Institute (ANSI)
Attribute-based encryption (AE)
Authentication
Authentication protocols
B
Big data cryptography
CIA triad
cloud architecture
clouds
cryptographic techniques
nodes
VC
SeeVerifiable computation (VC
Big integer libraries
Bignum C++ Library
Boost library
GMP library
L3HARRIS Geospatial Solutions
LibBF Library
Matt McCutchen
ttmath:UInt<>
Big integers
adding 1
addition algorithm
multiplication
multiplyingOneDigit function
shifting to left
standard integer
transforming standard integer
Bignum C++ Library
Bigrams counting
Birthday problem
Boost library
Bootstrappable encryption schemes
Boson scattering
Botan
Brute-force attack
examples
generating strings
running
types
Buffer-overflow attack, execution
C
C++20
callable concepts ...

Get Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.