EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-07-06, 492👍, 3💬
Perl Crypt::Blowfish Module
Tutorial notes and example codes on Crypt::Blowfish Perl Module. Topics include introduction of Crypt::Blowfish; Download and installation; Behavior tests; Test vector verification; Building 128-bit key test vectors. 2016-11-14, 207👍, 1💬
piqpr8.c - Generating Hex Digits of PI
A C source code is provided to generate hexadecimal digits of the fractional part of PI (0.1415927...) using the BBP (Bailey–Borwein–Plouffe) formula. 2016-03-25, 799👍, 1💬
Crypt::CBC Encryption with Salted Keys
A tutorial Perl example is provided to show how to use Crypt::CBC to perform encryption with a passphrase and a salt, which will be used to derive the secret key and the IV. 2015-12-20, 359👍, 1💬
Blowfish Decryption Algorithm
This section describes the Blowfish decryption algorithm, which is identical to the encryption algorithm step by step in the same order, only with the sub-keys applied in the reverse order. 2015-09-12, 212👍, 1💬
This section describes how to delete rows from target tables through ResultSet objects.
This free book is an excellent tutorial book for beginners. It is a collection of notes and sample c...
This section provides a tutorial example on how to download and install JDK 1.8.0 (Java SE 8), which...
This section describes a tutorial example of a complete SOAP application with both server and client...
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending messa...