1983 9.03 1985

Vol.9 n°3 (#89) march 1984

Vol.9 n°3 (#89) march 1984

(ddj_1984_03.jpg)

p.6 Editorial (p.151 in reprint volume 9)

p.6 Editorial (p.151 in reprint volume 9)

#Edito

TABLE OF CONTENTS

ARTICLES

ARTICLES

p.16 RSA: A Public Key Cryptography System, Part I (p.157 in reprint volume 9)

p.16 RSA: A Public Key Cryptography System, Part I (p.157 in reprint volume 9)

[author : C. E. Burton]

This two-part article details implementation of the Rivest- Shamir-Adleman Public Key cryptography system on a microcomputer. This first installment includes a quick overview of the author's implementation language and a discussion of the mathematical algorithms used. Next month, Part II will describe the generation of the keys and the encryption/decryption system, and the use of digital signatures.

p.44 Introduction to PL/C: Programming Language for Compilers (p.176 in reprint volume 9)

p.44 Introduction to PL/C: Programming Language for Compilers (p.176 in reprint volume 9)

[author : Morris Dovey]

Because development of new and more powerful processors seems to be outstripping that of supporting software, the PL/C programming language was designed to fill the need for rapid, low-cost development of reliable programming language compilers. Included here are discussion of the language structure and syntax, and a listing of the compiler in PL/C and macro-assembly code.

p.70 Program Design Using Pseudocode (p.195 in reprint volume 9)

p.70 Program Design Using Pseudocode (p.195 in reprint volume 9)

[author : Ken Takara]

Program design can be tedious, even using some of the available design tools. This article uses the construction of a "shoot-em-up game" to examine the flexibility and convenience that using pseudo-code can provide in the design process.

p.78 More On Binary Magic Numbers (p.202 in reprint volume 9)

p.78 More On Binary Magic Numbers (p.202 in reprint volume 9)

[author : Dale Wilson]

Inspired by Edwin Freed's "Binary Magic Numbers" (DDJ No. 78, April 1983), this article provides a C language implementation of a number of the algorithms presented by Freed. This provides both useful functions and interesting examples of the use of C to implement them.

DEPARTMENTS

DEPARTMENTS

p.7 Letters (p.152 in reprint volume 9)

p.7 Letters (p.152 in reprint volume 9)

p.9 Dr. Dobb's Clinic (p.153 in reprint volume 9)

p.9 Dr. Dobb's Clinic (p.153 in reprint volume 9)

Basically Precise; Transcendentally Precise; Stocking Up

p.12 CP/M Exchange (p.155 in reprint volume 9)

p.12 CP/M Exchange (p.155 in reprint volume 9)

How fast is CP/M Plus?; CP/M 2.2 BIOS Function: SELDSK; CP/M V2.2 Application Note

p.84 Software Reviews (p.206 in reprint volume 9)

p.84 Software Reviews (p.206 in reprint volume 9)

SXR PLUS: Sorted Cross Reference; Perfect Writer/Perfect Speller

p.88 Book Reviews (p.208 in reprint volume 9)

p.88 Book Reviews (p.208 in reprint volume 9)

Cryptography: Proceedings of Workshop on Cryptography; IBM Data Files; Microprocessor Support Chips: Theory, Design, and Applications ; Z80 Applications; Concepts for Distributed Systems Design; An Introduction to Numerical Methods with Pascal; Augmented Transition Networks

p.92 16-Bit Software Toolbox (p.211 in reprint volume 9)

p.92 16-Bit Software Toolbox (p.211 in reprint volume 9)

The collected, sorted and tabulated responses to last September's floating-point benchmark

p.98 Of Interest (p.215 in reprint volume 9)

p.98 Of Interest (p.215 in reprint volume 9)