*(gcrypt.info.gz)* Public Key cryptography (II)

Info Catalog
*(gcrypt.info.gz)* **Public Key cryptography (I)**
*(gcrypt.info.gz)* **Top**
*(gcrypt.info.gz)* **Random Numbers**
8 Public Key cryptography (II)
******************************
This chapter documents the alternative interface to asymmetric
cryptography (ac) that is not based on S-expressions, but on native C
data structures. As opposed to the pk interface described in the
former chapter, this one follows an open/use/close paradigm like other
building blocks of the library.

### Menu

* Available asymmetric algorithms List of algorithms supported by the library.
* Working with sets of data How to work with sets of data.
* Working with handles How to use handles.
* Working with keys How to work with keys.
* Using cryptographic functions How to perform cryptographic operations.
* Handle-independent functions General functions independent of handles.

Info Catalog
*(gcrypt.info.gz)* **Public Key cryptography (I)**
*(gcrypt.info.gz)* **Top**
*(gcrypt.info.gz)* **Random Numbers**

*automatically generated by***info2html**