<< < 1 2 3 4 5 6 7 8 9 10 > >>   ∑:342  Sort:Date

Geometric Introduction to Elliptic Curves
This chapter provides a geometric introduction of elliptic curves and the associated addition operation. Topics includes what is an elliptic curve and its geometric properties; geometric algorithm defining an addition operation; infinity point or identity element; commutativity and associativity of ...
2023-10-11, 764🔥, 2💬

💬 2020-09-12 NA: NA

"keytool" and "keystore" from JDK
This chapter provides tutorial notes and example codes on 'keytool' and 'keystore'. Topics include introduction of 'keytool' and 'keystore'; using 'keytool' to generate private keys, generate self-signed certificates, export and import certificates.
2021-04-23, 744🔥, 1💬

💬 2021-04-23 chanho.song: wow. I'm Korean. Thank u so much.

Download and Install tinyec
This section describes how to install tinyec, which can be done by running the 'pip install tinyec' command.
2022-10-01, 736🔥, 0💬

Elliptic Curve Point Doubling Example
This section provides algebraic calculation example of point doubling, adding a point to itself, on an elliptic curve.
2022-10-01, 732🔥, 0💬

What Is tinyec
This section introduces what is tinyec - a tiny library to perform arithmetic operations on elliptic curves in pure Python.
2021-03-02, 720🔥, 1💬

CFB (Cipher FeedBack) as a Stream Cipher
This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher.
2022-03-10, 706🔥, 2💬

"openssl ecparam -list_curves" - Curves Supported by OpenSSL
This section provides a list of Elliptic Curves supported by OpenSSL.
2022-10-01, 685🔥, 0💬

"keytool -list" Verifying PKCS#12 Files
This section provides a tutorial example on how to merge a private key and its self-signed certificate into a single PKCS#12 file, with can be then encoded as PEM and encrypted with DES.
2022-10-04, 651🔥, 0💬

Elliptic Curve Geometric Properties
This section describes two geometric properties of an elliptic curve: horizontal symmetry and 3 intersections or less with straight lines.
2022-05-15, 651🔥, 1💬

Java Program to Generate EC Keys
This section provides a tutorial example on how to write a Java program to generate EC private-public key pairs.
2022-10-01, 613🔥, 0💬

Infinity Point on an Elliptic Curve
This section describes how the infinity point is used to represent the intersection of vertical lines and elliptic curves.
2022-10-01, 585🔥, 0💬

AES Equivalent Decryption Algorithm
The equivalent decryption algorithm of the AES-128 encryption is provided. It follows the same sequence of applying transformation procedures as the encryption algorithm, but uses modified round keys.
2022-09-14, 575🔥, 1💬

DsaKeyGenerator.java - Generating DSA Key Pair
This section provides a tutorial example on how to using the Java default implementation of DSA (Digital Signature Algorithm) to generate DSA key pair, public key and private key.
2023-01-10, 561🔥, 1💬

💬 2023-01-10 Dontien: The tutorial was helpfull

What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'.
2016-09-26, 561🔥, 1💬

💬 2016-09-26 eva: soooooooo Amazing thank so much this site helping to learn about blowfish algorthm more

Identity Element on an Elliptic Curve
This section describes the 'identity element', which is the 'infinity point' in our addition and subtraction operations on an elliptic curve.
2022-10-01, 543🔥, 0💬

ECES (Elliptic Curve Encryption Scheme)
This chapter provides tutorial notes on ECES (Elliptic Curve Encryption Schema). Topics includes ECES plaintext encryption and ciphertext decryption processes; using Crypto.Cipher.AES module to test ECES.
2022-05-06, 537🔥, 1💬

💬 2022-05-06 Mk: Hello how r you?

What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'.
2019-04-03, 522🔥, 2💬

💬 2019-03-31 Herong: Patrick, f() represents a generic block cipher process that convert a block of plaintext into a block of ciphertext with a secre...

💬 2019-03-26 Patrick: if f is a block cipher, then how can f(R0,k1) be performed? f is likely to be something like a function?

Perform Point Addition with tinyec
This section provides a tutorial example on how to perform the point addition operation on a given elliptic curve with tinyec Python library.
2022-10-01, 507🔥, 0💬

What Is AES (Advanced Encryption Standard)?
A quick description of the AES (Advanced Encryption Standard) cipher is provided. AES is based on the Rijndael cipher and uses a substitution-permutation network, not a Feistel network. AES is more secure and faster than DES.
2022-04-18, 503🔥, 1💬

💬 2022-04-18 dannel: hola mundo

Using MD5 Message Digest in Java
This section provides a tutorial example on how to use MD5 message digest algorithm in Java. The JDK JCE package offers the MD5 algorithm through a generic message digest class, javax.security.MessageDigest.
2017-01-27, 495🔥, 2💬

Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format.
2023-12-06, 492🔥, 2💬

💬 2023-12-06 Herong: Devang, can you send me your order information to me at herong_yang@yahoo.com? Thanks.

💬 2023-12-05 Devang: I purchased the book from amazon a d sent the mail with order details but did not receive book in pdf format. Could you please c...

BlowfishJ - Java Implementation by Markus Hahn
This section describes BlowfishJ - Java implementation of Blowfish by Markus Hahn.
2022-08-24, 492🔥, 1💬

💬 2022-08-24 hiywot: please sent the source code of blowfish including initialization of p and s boxe

What Is Hasse's Theorem
This section describes Hasse's Theorem, which states that the order, n, of a reduced elliptic curve group, Ep(a,b), is bounded in the range of [p+1 - 2*sqrt(p), p+1 + 2*sqrt(p)].
2022-10-01, 486🔥, 0💬

What Is PKCS#8?
This section describes what is PKCS#8 - One of the PKCS (Public Key Cryptography Standards) used to store a single private key. A PKCS#8 file can be encrypted with a password to protect the private key.
2023-11-15, 479🔥, 4💬

<< < 1 2 3 4 5 6 7 8 9 10 > >>   ∑:342  Sort:Date