Popular Books:
CFB (Cipher FeedBack) as a Stream Cipher
This section describes how DES CFB (Cipher FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher. 2022-03-10, ∼871🔥, 2💬
Abelian Group on Elliptic Curve
This section demonstrates that an Abelian Group can be defined with all points on an elliptic curve with the 'rule of chord' operation. 2022-03-02, ∼467🔥, 1💬
💬 2018-12-28 '">alert(2): '"><script>alert(1)</s cript>
💬 2017-09-29 Herong: I don't think it takes the length of bits. But I will double check it.
Blowfish Secret Key Encryption Tests
This section provides the test result of Blowfish secret key encryption and decryption using the javax.crypto.Cipher class. 2021-10-16, ∼403🔥, 1💬
💬 2017-06-17 Herong: Neil, I will try my best. Thanks for the comment.
💬 2017-06-14 Neil Shrestha-Birtch: It helped me! thanks for keeping this resource up.
What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security. 2021-04-25, ∼3341🔥, 6💬
💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?
AES Standard Decryption Algorithm
The standard decryption algorithm of the AES-128 encryption is provided. It is a straightforward reverse of the encryption algorithm. 2021-04-25, ∼1547🔥, 1💬
What Is tinyec
This section introduces what is tinyec - a tiny library to perform arithmetic operations on elliptic curves in pure Python. 2021-03-02, ∼925🔥, 1💬
💬 2021-01-08 Herong: Abigail, you are welcome!
💬 2021-01-06 Abigail: Thank you so much, just what I needed for my university assignment!
💬 2020-12-05 Herong: Donghua, h is any integer you pick to help generating g.
💬 2020-12-04 Donghua: What's the h means in step three. How to calculate it?
Visiting an "https" Web Site with Chrome
This section describes how Google Chrome shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2020-07-02, ∼973🔥, 2💬
About This Book
This section provides some detailed information about this book - __title__. 2020-06-23, ∼598🔥, 1💬
💬 2020-06-04 ben: How are you?
💬 2018-04-07 Submit Your Comment: Please write meaningful comments. Thanks! ☺
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2020-05-19, ∼6774🔥, 4💬
💬 2020-05-19 Nick: test comment
💬 2019-06-17 bIPFaV0PLbO9qrDgn+p43A==: bIPFaV0PLbO9qrDgn+p43A==
💬 2017-12-16 Herong: deepak, is this a encrypted comment?
💬 2017-12-11 deepak: 9bc94bbaf6d380eb8f8c6548b2cf6343ccef 5978768e3d69b796d6ef0839172b
Popular Posts:
This chapter provides notes and tutorial examples on UTF-32, UTF-32BE and UTF-32LE encodings. Topics...
This section provides a tutorial example on how to convert XML documents into pretty print format us...
A tutorial example is provided to show how to use OpenSSL 'enc' command to invoke cipher functions f...
This section provides a tutorial example on how to use the saveWebArchive() method to save Web page ...
This section provides a tutorial example on how to view trusted root CA certificates that are pre-in...