Popular Books:
Order of Subgroup and Lagrange Theorem
This section describes Lagrange Theorem which states that the order of any subgroup in an finite Abelian group divides the order of the parent group. 2022-10-01, ∼355🔥, 0💬
What Are Standard Elliptic Curves
This section provides a list of standard elliptic curves selected and recommended by different organizations to generate secure EC private-pubic key pairs. 2022-10-01, ∼355🔥, 0💬
PKCS#8 and X.509 Key Encoding Classes
This section describes 2 JDK classes: PKCS8EncodedKeySpec representing the PKCS#8 encoding standard and the X.509 encoding standard. 2022-10-05, ∼348🔥, 0💬
OFB (Output FeedBack) as a Stream Cipher
This section describes how DES OFB (Output FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher. 2022-10-04, ∼348🔥, 0💬
Associativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true. 2022-10-01, ∼341🔥, 0💬
Additive Notation of Abelian Group
This section describes the Additive notation of an Abelian Group. The addition sign, +, is used as the operator. Number 0 is used as the identity element. 2022-10-01, ∼338🔥, 0💬
Algebraic Solution for Point Doubling
This section provides an algebraic solution for calculating the addition operation of two points at the same location on an elliptic curve. 2022-10-01, ∼334🔥, 0💬
Terminology
List of terms used in this book. 2022-10-01, ∼334🔥, 0💬
References
List of reference materials used in this book. 2022-10-01, ∼334🔥, 0💬
What Is Key Encoding?
This section describes private and public key encoding standards: PKCS#8 is used for encoding private keys and X.509 is used for encoding public keys. 2022-10-06, ∼330🔥, 0💬
mcrypt Encryption Functions
This section describes mcrypt encryption functions and 4 DES ciphers (operation modes) - 8-byte ECB, 8-byte CBC, 1-byte CFB, and 1-byte OFB ciphers. 2023-02-28, ∼328🔥, 1💬
Elliptic Curve Operation Summary
This section provides a summary of elliptic curve operations and their properties discussed in this chapter. 2022-10-01, ∼324🔥, 0💬
Popular Posts:
This section describes how to get a list of all tables in the current database on the SQL Server thr...
This section describes what is scrrun.dll - the Scripting Runtime DLL (Dynamic Link Library) provide...
This section provides a tutorial example on how to encryption the SOAP body element content with a R...
Tutorial notes and example codes are provided OpenSSL 'enc -bf-cbc' command for Blowfish encryption ...
This section describes how to sent Bitcoins to another address test transaction on live.blockcypher....