Reference Citations - HerongYang.com - v2.96, by Herong Yang
Usage of Chinese Cryptography Standards
'EC Cryptography Tutorials - Herong's Tutorial Example' tutorial book was cited in a thunes.com article in 2025.
The EC Cryptography Tutorials - Herong's Tutorial Examples tutorial book was cited in a thunes.com article in 2025.
Subject: Digital Signature – Usage of Chinese Cryptography Standards Date: 2025-03-29 Author: Pierre Gaulon Source: https://www.thunes.com/insights/trends/digital-signature-usage -of-chinese-cryptography-standards/ I have recently studied the Chinese cryptography standards published by the Chinese Commercial Cryptography Administration Office: SM2, SM3, and SM4 (SM stands for ShangMi). ... ECC is based on the discrete logarithm of elliptic curve elements. An elliptic curve consists of all the points of coordinates (x,y) verifying y² = x³+ax+b. For instance, Bitcoin uses the curve called secp256k1, which verifies y² = x³+7. It is possible to add two points of that curve together: ... https://www.herongyang.com/EC-Cryptography
Table of Contents
The Windows Forensics Journey - OriginalFileName
Configure TLS on Independent Gateway
►Usage of Chinese Cryptography Standards
Nichiren and The Opening of the Eyes
rdMolDraw2D.MolDraw2DCairo produces Pre-condition Violation
Using SAXParser to Validate XML Structure - XSD
Computer Science Course (Character Encoding)
Computer Science Course (Charactoer Encoding)
Contribution to the Parallelization by Synchronized Threads
Chemical Structure to SMILES Conversion
Introduction of Molecule SDF Format