Popular Books:
Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key? 2025-09-06, ∼388🔥, 1💬
Importing CA Certificate into Firefox
This section provides a tutorial example on how to import a CA certificate into Firefox in the 'Authorities' category. 2025-06-18, ∼569🔥, 1💬
First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm. 2025-04-28, ∼8217🔥, 13💬
💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.
💬 2019-04-26 Harry: Do you mean 8336 digits
💬 2024-04-23 ☺: meaningful comments. Thanks! ☺
💬 2022-12-02 Victor: meaningful comments.
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2024-03-13, ∼9262🔥, 37💬
💬 2018-10-20 Herong: bachi, thanks for sharing your comment.
💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm
What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks. 2024-01-31, ≈50🔥, 38💬
💬 2023-04-12 {"partnerReferenceNo": "APP12345: ok
💬 2023-01-18 Servant of Elon Musk's Regent: You are the chosen one!
💬 2022-11-17 Elon Musk's Regent: mommy
💬 2022-11-14 Elon Musk: Giving away twitter to the first person to reply and call me mommy
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2024-01-29, ∼5846🔥, 5💬
💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.
💬 2020-10-16 donjo dumdum: What is application of ECB mode operation
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2023-12-17, ∼880🔥, 5💬
Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection. 2023-12-12, ∼545🔥, 1💬
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2023-12-06, ∼643🔥, 2💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2023-11-19, ∼6477🔥, 10💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3340🔥, 3💬
"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2023-10-20, ∼5271🔥, 1💬
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2023-10-16, ∼364🔥, 2💬
💬 2023-10-16 subbarao: thanks for giving wonderful knowledge
Popular Posts:
This section provides a tutorial example on how to use SHA1 message digest algorithm in Java. The JD...
This section describes how to download and install Java SE 10 on Windows.
Yang Chun Bai Xue (阳春白雪) - White Snow in Early Spring, lute music (琵琶曲), was composed by Shi Kuan...
This section provides a tutorial example on how to run Perl scripts on Linux systems. To make a Perl...
This section describes a tutorial on how to play DAT files directly with Windows Media Player.