From: Childers James <ic58@jove.acs.unt.edu>
To: cypherpunks@toad.com
Message Hash: c9253f57ac8295f8bea73356eb986750caf82cbfcac1128bebf3616254ed6877
Message ID: <Pine.SOL.3.91.950916153657.18178A-100000@jove.acs.unt.edu>
Reply To: N/A
UTC Datetime: 1995-09-16 20:42:18 UTC
Raw Date: Sat, 16 Sep 95 13:42:18 PDT
From: Childers James <ic58@jove.acs.unt.edu>
Date: Sat, 16 Sep 95 13:42:18 PDT
To: cypherpunks@toad.com
Subject: Newbie Crypto question: MOD?
Message-ID: <Pine.SOL.3.91.950916153657.18178A-100000@jove.acs.unt.edu>
MIME-Version: 1.0
Content-Type: text/plain
Ok folks, I recently received "Applied Cryptography" as a gift, and just
have one question: How does the MOD function work in crypto functions? It
seems to work differently than what I've seen before, i.e.: C/C++ MOD. I
also didn't see anything in TCM's FAQ...
If this is considered noise, I apologize in advance.
"Freedom is meaningless unless | ic58@jove.acs.unt.edu - James Childers
you can give to those with whom| No man's freedom is safe
you disagree." - Jefferson | while Congress is in session
EA 73 53 12 4E 08 27 6C 21 64 28 51 92 0E 7C F7
Return to September 1995
Return to “Childers James <ic58@jove.acs.unt.edu>”
1995-09-16 (Sat, 16 Sep 95 13:42:18 PDT) - Newbie Crypto question: MOD? - Childers James <ic58@jove.acs.unt.edu>