Popular Books:
What Is an Elliptic Curve?
This section describes what is elliptic curve - A set of 2 dimensional points of (x, y) that satisfy the y*y = x*x*x + a*x + b equation with given values of a and b. 2022-05-15, ∼549🔥, 1💬
"keytool -exportcert" Exporting PrivateKeyEntry
This section provides a tutorial example on how to export a 'PrivateKeyEntry' stored in a 'keystore' file using the 'keytool -exportcert' command. 2022-10-04, ∼536🔥, 0💬
Is ECDH Key Exchange Secure
This section discusses the question of: how secure is the ECDH (Elliptic Curve Diffie-Hellman) key exchange protocol? 2022-10-01, ∼516🔥, 0💬
EC Key File with Curve Name
This section provides a tutorial example on the EC private key file with curve name only. Actuall domain parameters are not stored in the key file. 2022-10-01, ∼499🔥, 0💬
Create EC Public Key File
This section provides a tutorial example on how to extract the public key out of an EC private key file with the 'openssl ec -pubout' command. 2022-10-01, ∼493🔥, 0💬
Commutativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true. 2022-10-01, ∼489🔥, 0💬
Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation. 2022-03-02, ∼480🔥, 1💬
"sect283r1" - For 256-Bit ECC Keys
This section describes 'sect283r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2022-10-01, ∼470🔥, 0💬
Java Implementation of DES - Test Cases
This section provides two test cases for the Java implementation of DES algorithm, CipherDES.java. 2018-03-30, ∼464🔥, 2💬
Archived: Visiting "https" Web Site with Firefox 3
This section describes how Firefox 3 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2018-11-10, ∼451🔥, 2💬
💬 2018-11-10 Herong: Falle, try to use whois.icann.org to get more information about that website.
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2023-10-16, ∼443🔥, 2💬
💬 2023-10-16 subbarao: thanks for giving wonderful knowledge
How to Calculate "M**e mod n"
This section discusses the difficulties of calculating 'M**e mod n'. The intermediate result of 'M**e' is too big for most programming languages. 2022-10-04, ∼433🔥, 0💬
Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class. 2021-10-16, ∼431🔥, 1💬
Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key? 2025-09-06, ∼428🔥, 1💬
Popular Posts:
People born in the year of the snake may become philosophers, theologians, politicians, or cunning f...
Gan Lan Shu (橄榄树) - Olive Tree, Lyrics by San Mao (三毛), Music by Li Taixiang (李泰祥), Performed ori...
This free book is a collection of notes on developing a new programming language called H (Hybrid).
This section provides a tutorial example on how to convert XML documents into pretty print format us...
This section provides 3 solutions and sample programs on how to close the main frame and terminate t...