Popular Books:
💬 2016-10-17 Deepak: Working on Algorithm
💬 2015-10-04 Herong: Salai, you are most welcome.
💬 2015-10-02 Salai Joy Siang Pi: Thank you so much. It's very helpful for my mini-thesis.
Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies 2019-02-18, ∼3512🔥, 2💬
💬 2019-02-18 Hh: <body bgcolor="red">
💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics
"brainpoolP256r1"“ - For 256-Bit ECC Keys
This section describes 'brainpoolP256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by RFC 5639. 2022-10-01, ∼3502🔥, 0💬
Cryptography Basic Concepts
This chapter describes some basic concepts of cryptography: what is cryptography, what is function and what is encryption. 2016-04-07, ∼3466🔥, 4💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3390🔥, 3💬
What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security. 2021-04-25, ∼3339🔥, 6💬
💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?
DES Key Schedule Algorithm Illustration Program Output
This section provides the execution output of the tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2015-08-09, ∼2600🔥, 1💬
SHA1 Mesasge Digest Algorithm
This chapter provides tutorial notes and example codes on the SHA1 message digest algorithm. Topics include SHA1 algorithm overview; using SHA1 in Java, PHP, and Perl. 2016-11-05, ∼2413🔥, 5💬
💬 2015-10-13 Yojana Yadav: Plz send me the detail of key generation of Blowfish Algorithm
Key Pair Sample Program - JcaKeyPair.java
This section provides a tutorial example on how to write simple program to generate a pair of private key and public key for the RSA or DSA algorithm. 2016-03-01, ∼2159🔥, 1💬
💬 2023-06-05 Daniel: I don't understand how to assign key for plaintext
💬 2016-03-16 YOGITA: what is the function blowfish(T) here? Send the pseudo code
mcrypt DES Encryption Testing Program
This section provides a tutorial example on how to use the DES algorithm in a specific operation mode as block or stream cipher. 2017-08-03, ∼1879🔥, 3💬
💬 2017-08-03 Herong: Deepan, Which part is difficult for you to understand?
"secp256k1" - For 256-Bit ECC Keys
This section describes 'secp256k1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2022-10-01, ∼1729🔥, 0💬
Example Vector of AES Encryption
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds are included to help users to verify their AES implementation. 2019-02-24, ∼1695🔥, 1💬
Generating New RSA Key Pairs
This section provides a tutorial example on how to generate a new pair of RSA priviate key and public key using the OpenSSL command line tool. 2015-11-03, ∼1679🔥, 1💬
DESSubkeysTest.java - DES Key Schedule Algorithm Illustration
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedule algorithm works. 2020-02-10, ∼1661🔥, 3💬
Popular Posts:
Want to know when is the 2021 Chinese New Year day? Look for free Chinese calendars for 2021? Chines...
This section provides a tutorial example on how to see the list of trusted root CA (PKI Authorities)...
新冠病毒疫苗有哪些种类? 各种疫苗的工作机制是什么? 各种疫苗有哪些特点? 下面我们对这些问题进行初步的解答:...
This book is a collection of notes and sample codes written by the author while he was learning JVM ...
This section provides a quick description of SOAP Encoding and samples of serializing simple and com...