<< < 2 3 4 5 6 7 8 9 10 11 12 > >>   ∑:342  Sort:Date

Modular Arithmetic Reduction on Rational Numbers
This section describes how to perform Modular Arithmetic Reduction on Rational Numbers, which is equivalent to perform modular multiplication of the numerator and the multiplicative inverse of the denominator.
2022-10-01, ∼536🔥, 0💬

"keytool -groupname ..." - Select Curve Name
This section provides a tutorial example on how to using 'keytool -groupname ...' option to select a different elliptic curve when generating EC private-public key pairs.
2022-10-01, ∼532🔥, 0💬

What Is an Elliptic Curve?
This section describes what is elliptic curve - A set of 2 dimensional points of (x, y) that satisfy the y*y = x*x*x + a*x + b equation with given values of a and b.
2022-05-15, ∼525🔥, 1💬

"keytool -genkeypair" Generating PrivateKeyEntry
This section provides a tutorial example on how to generate a private and public key pair using the 'keytool -genkeypair' command. It stores the key pair in a 'PrivateKeyEntry' in a 'keystore' file.
2022-10-04, ∼503🔥, 0💬

"keytool -exportcert" Exporting PrivateKeyEntry
This section provides a tutorial example on how to export a 'PrivateKeyEntry' stored in a 'keystore' file using the 'keytool -exportcert' command.
2022-10-04, ∼498🔥, 0💬

Same Point Addition on an Elliptic Curve
This section describes how to perform the addition operation of a point P to the same point P on an elliptic curve. In this case, we will draw a straight line that passes P and tangent to the curve to find -R.
2022-10-01, ∼498🔥, 0💬

What Is "keystore"?
This section describes what is a 'keystore' file - A database file introduced in JDK (Java Development Kit) to store your own private keys and public key certificates you received from other people.
2022-10-07, ∼496🔥, 0💬

Is ECDH Key Exchange Secure
This section discusses the question of: how secure is the ECDH (Elliptic Curve Diffie-Hellman) key exchange protocol?
2022-10-01, ∼492🔥, 0💬

Cipher - Secret Key Encryption and Decryption
This chapter provides tutorial notes and example codes on the cipher process. Topics include the cipher process - data encryption and decryption; the cipher class, javax.crypto.Cipher; the cipher sample program and test results with Blowfish and DES encryption algorithms.
2015-10-13, ∼476🔥, 1💬

Commutativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true.
2022-10-01, ∼475🔥, 0💬

EC Key File with Curve Name
This section provides a tutorial example on the EC private key file with curve name only. Actuall domain parameters are not stored in the key file.
2022-10-01, ∼469🔥, 0💬

Find Subgroup with Point Addition
This section provides a tutorial example on how to find the subgroup of a given point on an elliptic curve using a loop of point additions with tinyec Python library.
2022-10-01, ∼467🔥, 0💬

Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation.
2022-03-02, ∼467🔥, 1💬

Create EC Public Key File
This section provides a tutorial example on how to extract the public key out of an EC private key file with the 'openssl ec -pubout' command.
2022-10-01, ∼466🔥, 0💬

Java Implementation of DES - Test Cases
This section provides two test cases for the Java implementation of DES algorithm, CipherDES.java.
2018-03-30, ∼453🔥, 2💬

Abelian Group and Elliptic Curves
This chapter provides an introduction to Abelian Group, which can be expressed in the multiplicative notation or the additive notation. An Abelian Group and be defined on an elliptic curve using the 'rule of chord' operation.
2022-10-01, ∼443🔥, 0💬

"sect283r1" - For 256-Bit ECC Keys
This section describes 'sect283r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org.
2022-10-01, ∼443🔥, 0💬

Algebraic Introduction to Elliptic Curves
This chapter provides an algebraic introduction of addition operations on elliptic curves. Algebraic solutions are provided to calculate addition operations by dividing the problem into 4 cases: two symmetric points, one infinity point, two identical points, and two distinct points.
2022-10-01, ∼422🔥, 0💬

Archived: Visiting "https" Web Site with Firefox 3
This section describes how Firefox 3 shows a lock icon when you visit an 'https' Web site to provide you more security related information.
2018-11-10, ∼416🔥, 2💬

💬 2018-11-10 Herong: Falle, try to use whois.icann.org to get more information about that website.

💬 2018-11-10 Falle: Thanks for your help . I couldn't access full information about cardtopia.org a website that scammed me of apple gift cards wort...

Addition Operation on an Elliptic Curve
This section describes the addition operation on an elliptic curve geometrically. The addition of points P and Q on an elliptic curve is a point R on the curve, which is the symmetrical point of -R, which is the third intersection of the curve and the straight line passing through P and Q.
2022-10-01, ∼414🔥, 0💬

Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key?
2025-09-06, ∼413🔥, 1💬

RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers.
2023-10-16, ∼408🔥, 2💬

💬 2023-10-16 subbarao: thanks for giving wonderful knowledge

Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class.
2021-10-16, ∼403🔥, 1💬

💬 2021-10-16 Mr.ostin: Okay

How to Calculate "M**e mod n"
This section discusses the difficulties of calculating 'M**e mod n'. The intermediate result of 'M**e' is too big for most programming languages.
2022-10-04, ∼393🔥, 0💬

<< < 2 3 4 5 6 7 8 9 10 11 12 > >>   ∑:342  Sort:Date