当前位置:网站首页>第0章 前言和环境配置
第0章 前言和环境配置
2022-07-24 11:39:00 【小原小原吃汤圆】
最近在学习SM2,但是对于大数运算一窍不通,然后看到了libtommath库和书籍《大数运算:加密多精度算法的理论与实现》。这本书讲解了libtommath库的实现和应用,但是其中的代码注释写的并不是很容易理解,而且并没有给出相应的编程使用实例。因此在这里博主打算对其进行一些完善。
这一篇文章的主要内容在于对环境的配置。
文件如下:这个文件里是已经编译好的libtommath库,直接使用即可(Linux下)。
文件下载
如何使用:
gcc test.cpp -L. -lCoreCpt -Iinclude
export LD_LIBRARY_PATH="."
./a.out
这样就可以运行一个简单的例子了
如何懂得如何使用make的话,就可以自己进行相应的修改,这里不再赘述。
边栏推荐
- L2-011 玩转二叉树
- 使用Prometheus+Grafana实时监控服务器性能
- SSH跨平台终端工具tabby推荐
- Record a garbage collection and analysis of gceasy
- Nodejs ctf 基础
- Use prometheus+grafana to monitor server performance in real time
- 有关并行的两个重要定律
- Hash - 1. Sum of two numbers - some people fall in love during the day, some people watch the sea at night, and some people can't do the first question
- Idea runs the wordcount program (detailed steps)
- 安装jmeter
猜你喜欢

【10】 Teamwork and cross team collaboration

Remember to optimize my personal blog once

1184. Distance between bus stops: simple simulation problem

Nodejs CTF Foundation

Use prometheus+grafana to monitor server performance in real time

Nodejs ctf 基础

How to choose sentinel vs. hystrix current limiting?

Install MariaDB columnstore (version 10.3)

Ctfshow ThinkPHP topic 1

What is the charm of CSDN members? What's the use of him?
随机推荐
2 万字详解,吃透 ES!
Tensor and numpy convert "suggested collection" to each other
什么是云原生,云原生技术为什么这么火?
有关并行的两个重要定律
【反序列化漏洞-01】序列化与反序列化简介
08.01 adjacency matrix
[golang] deletion and emptying of map elements in golang
Depth first search and breadth first search of Graphs
视频回放 | 如何成为一名优秀的地学和生态学领域的国际期刊审稿人?
Nodejs ctf 基础
In BS4.String and Difference between text
Text message verification of web crawler
SSH跨平台终端工具tabby推荐
What is the charm of CSDN members? What's the use of him?
哈希——202. 快乐数
ctfshow ThinkPHP专题 1
Notes on @enableconfigurationproperties
Performance test summary (I) -- basic theory
Imeta view | is short reading long amplicon sequencing applicable to the prediction of microbiome function?
[deserialization vulnerability-02] principle test and magic method summary of PHP deserialization vulnerability