<< < 2 3 4 5 6 7 8 9 10 11 12 > >>   ∑:342  Sort:Date

References
List of reference materials used in this book.
2019-06-30, ∼506🔥, 1💬

💬 2019-06-30 Wayne: This is very helpful, Thank you!

"keytool -groupname ..." - Select Curve Name
This section provides a tutorial example on how to using 'keytool -groupname ...' option to select a different elliptic curve when generating EC private-public key pairs.
2022-10-01, ∼494🔥, 0💬

What Is an Elliptic Curve?
This section describes what is elliptic curve - A set of 2 dimensional points of (x, y) that satisfy the y*y = x*x*x + a*x + b equation with given values of a and b.
2022-05-15, ∼482🔥, 1💬

"keytool -genkeypair" Generating PrivateKeyEntry
This section provides a tutorial example on how to generate a private and public key pair using the 'keytool -genkeypair' command. It stores the key pair in a 'PrivateKeyEntry' in a 'keystore' file.
2022-10-04, ∼460🔥, 0💬

Same Point Addition on an Elliptic Curve
This section describes how to perform the addition operation of a point P to the same point P on an elliptic curve. In this case, we will draw a straight line that passes P and tangent to the curve to find -R.
2022-10-01, ∼460🔥, 0💬

Is ECDH Key Exchange Secure
This section discusses the question of: how secure is the ECDH (Elliptic Curve Diffie-Hellman) key exchange protocol?
2022-10-01, ∼454🔥, 0💬

Commutativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true.
2022-10-01, ∼453🔥, 0💬

Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation.
2022-03-02, ∼449🔥, 1💬

Find Subgroup with Point Addition
This section provides a tutorial example on how to find the subgroup of a given point on an elliptic curve using a loop of point additions with tinyec Python library.
2022-10-01, ∼446🔥, 0💬

Cipher - Secret Key Encryption and Decryption
This chapter provides tutorial notes and example codes on the cipher process. Topics include the cipher process - data encryption and decryption; the cipher class, javax.crypto.Cipher; the cipher sample program and test results with Blowfish and DES encryption algorithms.
2015-10-13, ∼441🔥, 1💬

Create EC Public Key File
This section provides a tutorial example on how to extract the public key out of an EC private key file with the 'openssl ec -pubout' command.
2022-10-01, ∼440🔥, 0💬

EC Key File with Curve Name
This section provides a tutorial example on the EC private key file with curve name only. Actuall domain parameters are not stored in the key file.
2022-10-01, ∼437🔥, 0💬

Java Implementation of DES - Test Cases
This section provides two test cases for the Java implementation of DES algorithm, CipherDES.java.
2018-03-30, ∼437🔥, 2💬

Abelian Group and Elliptic Curves
This chapter provides an introduction to Abelian Group, which can be expressed in the multiplicative notation or the additive notation. An Abelian Group and be defined on an elliptic curve using the 'rule of chord' operation.
2022-10-01, ∼428🔥, 0💬

"keytool -exportcert" Exporting PrivateKeyEntry
This section provides a tutorial example on how to export a 'PrivateKeyEntry' stored in a 'keystore' file using the 'keytool -exportcert' command.
2022-10-04, ∼421🔥, 0💬

What Is "keystore"?
This section describes what is a 'keystore' file - A database file introduced in JDK (Java Development Kit) to store your own private keys and public key certificates you received from other people.
2022-10-07, ∼414🔥, 0💬

"sect283r1" - For 256-Bit ECC Keys
This section describes 'sect283r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org.
2022-10-01, ∼408🔥, 0💬

Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key?
2025-09-06, ∼387🔥, 1💬

Algebraic Introduction to Elliptic Curves
This chapter provides an algebraic introduction of addition operations on elliptic curves. Algebraic solutions are provided to calculate addition operations by dividing the problem into 4 cases: two symmetric points, one infinity point, two identical points, and two distinct points.
2022-10-01, ∼387🔥, 0💬

Archived: Visiting "https" Web Site with Firefox 3
This section describes how Firefox 3 shows a lock icon when you visit an 'https' Web site to provide you more security related information.
2018-11-10, ∼383🔥, 2💬

💬 2018-11-10 Herong: Falle, try to use whois.icann.org to get more information about that website.

💬 2018-11-10 Falle: Thanks for your help . I couldn't access full information about cardtopia.org a website that scammed me of apple gift cards wort...

Addition Operation on an Elliptic Curve
This section describes the addition operation on an elliptic curve geometrically. The addition of points P and Q on an elliptic curve is a point R on the curve, which is the symmetrical point of -R, which is the third intersection of the curve and the straight line passing through P and Q.
2022-10-01, ∼378🔥, 0💬

Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class.
2021-10-16, ∼374🔥, 1💬

💬 2021-10-16 Mr.ostin: Okay

mcrypt Library for PHP
This section describes the mcrypt library - encryption extension for PHP. mcrypt supports DES and many other encryption algorithms.
2019-12-19, ∼365🔥, 1💬

RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers.
2023-10-16, ∼364🔥, 2💬

💬 2023-10-16 subbarao: thanks for giving wonderful knowledge

<< < 2 3 4 5 6 7 8 9 10 11 12 > >>   ∑:342  Sort:Date