<< < 1 2 3 4 5 6 7 8 9 10 11 > >>   ∑:342  Sort:Date

BlowfishJ - Java Implementation by Markus Hahn
This section describes BlowfishJ - Java implementation of Blowfish by Markus Hahn.
2022-08-24, ∼617🔥, 1💬

💬 2022-08-24 hiywot: please sent the source code of blowfish including initialization of p and s boxe

Using MD5 Message Digest in Java
This section provides a tutorial example on how to use MD5 message digest algorithm in Java. The JDK JCE package offers the MD5 algorithm through a generic message digest class, javax.security.MessageDigest.
2017-01-27, ∼612🔥, 2💬

What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'.
2019-04-03, ∼606🔥, 2💬

💬 2019-03-31 Herong: Patrick, f() represents a generic block cipher process that convert a block of plaintext into a block of ciphertext with a secre...

💬 2019-03-26 Patrick: if f is a block cipher, then how can f(R0,k1) be performed? f is likely to be something like a function?

ECES (Elliptic Curve Encryption Scheme)
This chapter provides tutorial notes on ECES (Elliptic Curve Encryption Schema). Topics includes ECES plaintext encryption and ciphertext decryption processes; using Crypto.Cipher.AES module to test ECES.
2022-05-06, ∼601🔥, 1💬

💬 2022-05-06 Mk: Hello how r you?

What Is Hasse's Theorem
This section describes Hasse's Theorem, which states that the order, n, of a reduced elliptic curve group, Ep(a,b), is bounded in the range of [p+1 - 2*sqrt(p), p+1 + 2*sqrt(p)].
2022-10-01, ∼592🔥, 0💬

ECDSA (Elliptic Curve Digital Signature Algorithm)
This chapter provides tutorial notes on ECDSA (Elliptic Curve Digital Signature Algorithm). Topics includes ECDSA digital signature generation process and verification process; security issue of the private key with same random number k is used; find possible public keys from a digital signature; in...
2022-10-01, ∼581🔥, 0💬

What Is AES (Advanced Encryption Standard)?
A quick description of the AES (Advanced Encryption Standard) cipher is provided. AES is based on the Rijndael cipher and uses a substitution-permutation network, not a Feistel network. AES is more secure and faster than DES.
2022-04-18, ∼571🔥, 1💬

💬 2022-04-18 dannel: hola mundo

Importing CA Certificate into Firefox
This section provides a tutorial example on how to import a CA certificate into Firefox in the 'Authorities' category.
2025-06-18, ∼568🔥, 1💬

Exporting Certificates Out of Firefox
This section provides a tutorial example on how to export a certificate from Firefox into a certificate file in DER and PEM formats.
2022-10-04, ∼566🔥, 0💬

"keytool -printcert" Printing Certificate Details
This section provides a tutorial example on how to print details of the certificate exported by 'keytool -exportcert' command using the 'keytool -printcert' command.
2022-10-04, ∼562🔥, 0💬

About This Book
This section provides some detailed information about this book - __title__.
2020-06-23, ∼557🔥, 1💬

💬 2020-06-23 chris: Thank so much ! All Crypto printed books in cart !! Very well done. Most useful books i've seen in quite some time.

Generators and Cyclic Subgroups
This chapter provides introduction on generating subgroups from elements in finite Abelian groups; definitions and examples of subgroup generators, subgroup order, cyclic subgroups, Lagrange-Theorem.
2022-10-01, ∼551🔥, 0💬

Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection.
2023-12-12, ∼544🔥, 1💬

EC Cryptography in Java
This chapter provides tutorial notes on generating EC (Elliptic Curve) keys with Java technology. Topics covered include using 'keytool' command to generate EC private-public key pairs; selecting different name elliptic curves or key sizes; writing Java program to generate EC keys.
2022-10-01, ∼539🔥, 0💬

Build New Curves with tinyec
This section provides a tutorial example on how to create elliptic curve, actually a reduced elliptic curve group, with tinyec Python library.
2022-12-27, ∼537🔥, 1💬

Testing RsaKeyEncryption.java with a 16-bit Key
This section provides a tutorial example on testing my RSA encryption and decryption implementation using the java.math.BigInteger class with a 16-bit key.
2019-09-02, ∼536🔥, 1💬

Negation Operation on an Elliptic Curve
This section describes the Negation operation on an elliptic curve. If the resulting point the negation operation of an given point P is R, then P + R is the infinity point.
2022-10-01, ∼535🔥, 0💬

Subtraction Operation on an Elliptic Curve
This section describes the Subtraction operation on an elliptic curve. If the resulting point of the subtraction operation of point Q from P, then P - R = P + (-Q)..
2022-10-01, ∼535🔥, 0💬

AES Key Schedule Algorithm
A quick description of the AES key schedule algorithm is provided. AES key schedule expands the given cipher key into 11 round keys. It uses round constants, S-box lookups and byte rotations.
2022-10-04, ∼534🔥, 0💬

"OpenSSL" Signing CSR Generated by "keytool"
This chapter provides tutorial notes and example codes on using 'OpenSSL' to act as CA (Certificate Authority). Topics include setting up 'OpenSSL' as CA; using 'keytool' to generate CA private key; using 'keytool' to generate CSR (Certificate Signing Request); using 'OpenSSL' to sign CSR, using 'ke...
2018-07-12, ∼532🔥, 1💬

Standard Elliptic Curves
This chapter provides tutorial notes on standard elliptic curves. Topics covered include a list of standard curves; domain parameters of some commonly used standard curves; generating and views private-public key pairs associated domain parameters.
2022-10-01, ∼522🔥, 0💬

Python Program for Integer Elliptic Curves
This section provides simple Python program, IntegerEllipticCurve.py, that searches integer points on any given elliptic curve with integer coefficients.
2022-10-01, ∼518🔥, 0💬

What Is Trapdoor Function
This section describes what is Trapdoor Function - An operation that is much easier to perform than its reverse operation.
2022-10-01, ∼515🔥, 0💬

Modular Arithmetic Reduction on Rational Numbers
This section describes how to perform Modular Arithmetic Reduction on Rational Numbers, which is equivalent to perform modular multiplication of the numerator and the multiplicative inverse of the denominator.
2022-10-01, ∼511🔥, 0💬

<< < 1 2 3 4 5 6 7 8 9 10 11 > >>   ∑:342  Sort:Date