Popular Books:
What Is Trapdoor Function
This section describes what is Trapdoor Function - An operation that is much easier to perform than its reverse operation. 2022-10-01, ∼519🔥, 0💬
What Is an Elliptic Curve?
This section describes what is elliptic curve - A set of 2 dimensional points of (x, y) that satisfy the y*y = x*x*x + a*x + b equation with given values of a and b. 2022-05-15, ∼490🔥, 1💬
Is ECDH Key Exchange Secure
This section discusses the question of: how secure is the ECDH (Elliptic Curve Diffie-Hellman) key exchange protocol? 2022-10-01, ∼465🔥, 0💬
Commutativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true. 2022-10-01, ∼456🔥, 0💬
Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation. 2022-03-02, ∼453🔥, 1💬
EC Key File with Curve Name
This section provides a tutorial example on the EC private key file with curve name only. Actuall domain parameters are not stored in the key file. 2022-10-01, ∼450🔥, 0💬
Create EC Public Key File
This section provides a tutorial example on how to extract the public key out of an EC private key file with the 'openssl ec -pubout' command. 2022-10-01, ∼446🔥, 0💬
Java Implementation of DES - Test Cases
This section provides two test cases for the Java implementation of DES algorithm, CipherDES.java. 2018-03-30, ∼446🔥, 2💬
"keytool -exportcert" Exporting PrivateKeyEntry
This section provides a tutorial example on how to export a 'PrivateKeyEntry' stored in a 'keystore' file using the 'keytool -exportcert' command. 2022-10-04, ∼434🔥, 0💬
"sect283r1" - For 256-Bit ECC Keys
This section describes 'sect283r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2022-10-01, ∼420🔥, 0💬
Archived: Visiting "https" Web Site with Firefox 3
This section describes how Firefox 3 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2018-11-10, ∼394🔥, 2💬
💬 2018-11-10 Herong: Falle, try to use whois.icann.org to get more information about that website.
Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key? 2025-09-06, ∼393🔥, 1💬
Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class. 2021-10-16, ∼387🔥, 1💬
mcrypt Library for PHP
This section describes the mcrypt library - encryption extension for PHP. mcrypt supports DES and many other encryption algorithms. 2019-12-19, ∼379🔥, 1💬
RSA Public Key Encryption Algorithm
This section describes the RSA public key encryption algorithm. Generating public and private keys used in RSA encryption requires two large prime numbers. 2023-10-16, ∼378🔥, 2💬
💬 2023-10-16 subbarao: thanks for giving wonderful knowledge
Popular Posts:
This section describes how to get a list of all tables in the current database on the SQL Server thr...
On the evening of the seventh day of the seventh month on the Chinese lunar calendar, look carefully...
This section provides a tutorial example on downloading and installing SoapUI on Windows system.
The 9th day of the 9th lunar month is the traditional Chongyang Festival, or Double Ninth Festival. ...
Want to know when is the 2037 Chinese New Year day? Look for free Chinese calendars for 2037? Chines...