Cryptography Reference
In-Depth Information
Note that for the following access to the table of powers of g , the reduction of the
exponent m+n=LogTable[f] + LogTable[h] is unnecessary.
return (AntiLogTable[LogTable[f] + LogTable[h]]);
}
else
{
return 0;
}
}
Table 11-3. Logarithms to base g ( x )= x +1 (e.g., log g ( x ) 2=25=19 in hexadecimal,
log g ( x ) 255=7 ).
00
19
01
32
02
1A
C6
4B
C7
1B
68
33
EE
DF
03
64
04
E0
0E
34
8D
81
EF
4C
71
08
C8
F8
69
1C
C1
7D
C2
1D
B5
F9
B9
27
6A
4D
E4
A6
72
9A
C9
09
78
65
2F
8A
05
21
0F
E1
24
12
F0
82
45
35
93
DA
8E
96
8F
DB
BD
36
D0
CE
94
13
5C
D2
F1
40
46
83
38
66
DD
FD
30
BF
06
8B
62
B3
25
E2
98
22
88
91
10
7E
6E
48
C3
A3
B6
1E
42
3A
6B
28
54
FA
85
3D
BA
2B
79
0A
15
9B
9F
5E
CA
4E
D4
AC
E5
F3
73
A7
57
AF
58
A8
50
F4
EA
D6
74
4F
AE
E9
D5
E7
E6
AD
E8
2C
D7
75
7A
EB
16
0B
F5
59
CB
5F
B0
9C
A9
51
A0
7F
0C
F6
6F
17
C4
49
EC
D8
43
1F
2D
A4
76
7B
B7
CC
BB
3E
5A
FB
60
B1
86
3B
52
A1
6C
AA
55
29
9D
97
B2
87
90
61
BE
DC
FC
BC
95
CF
CD
37
3F
5B
D1
53
39
84
3C
41
A2
6D
47
14
2A
9E
5D
56
F2
D3
AB
44
11
92
D9
23
20
2E
89
B4
7C
B8
26
77
99
E3
A5
67
4A
ED
DE
C5
31
FE
18
0D
63
8C
80
C0
F7
70
07
 
Search WWH ::




Custom Search