This book is a technical guide to the Crypto++ library. The treatment includes compiling and linking the Crypto++ library; linking against the Crypto++ library; and using Crypto++ functionality such as encoder, decoders, random number generators, encryptors, decryptors, hashing and verification, signers, and signature verifiers. In addition, lesser known crypto-systems such as ECIES, Nyberg-Rueppel, Rabin-Williams, and Menezes-Qu-Vanstone are examined. After reading the guide, one will be able incorporate Crypto++ into a program and provide confidentiality and integrity over the program's data; and interoperate with cryptographic components other popular libraries such as OpenSSL and GnuTLS.
Recommendations
Improved convertible authenticated encryption scheme with provable security
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated ...
Efficient certificateless proxy signature scheme with provable security
In this paper we propose a very efficient and provably secure proxy signature scheme with implicit certificate (called ''certificateless proxy signature scheme''), where a receiver does not have to verify a certificate before verifying a signed message, ...