Popular Books:
What Are Standard Elliptic Curves
This section provides a list of standard elliptic curves selected and recommended by different organizations to generate secure EC private-pubic key pairs. 2022-10-01, ∼380🔥, 0💬
Additive Notation of Abelian Group
This section describes the Additive notation of an Abelian Group. The addition sign, +, is used as the operator. Number 0 is used as the identity element. 2022-10-01, ∼379🔥, 0💬
"Legacy SunEC curve disabled" Error
This section provides a tutorial example on how to resolve the 'Legacy SunEC curve disabled' error and get short and insecure EC private-public key pairs. 2022-10-01, ∼377🔥, 0💬
OFB (Output FeedBack) as a Stream Cipher
This section describes how DES OFB (Output FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher. 2022-10-04, ∼366🔥, 0💬
Algebraic Solution for Point Doubling
This section provides an algebraic solution for calculating the addition operation of two points at the same location on an elliptic curve. 2022-10-01, ∼365🔥, 0💬
Terminology
List of terms used in this book. 2022-10-01, ∼364🔥, 0💬
Associativity of Elliptic Curve Operations
This section describes the associativity of the addition operation on an elliptic curve. P + (Q + S) = (P + Q) + S is true. 2022-10-01, ∼358🔥, 0💬
Elliptic Curve Operation Summary
This section provides a summary of elliptic curve operations and their properties discussed in this chapter. 2022-10-01, ∼349🔥, 0💬
mcrypt Encryption Functions
This section describes mcrypt encryption functions and 4 DES ciphers (operation modes) - 8-byte ECB, 8-byte CBC, 1-byte CFB, and 1-byte OFB ciphers. 2023-02-28, ∼348🔥, 1💬
References
List of reference materials used in this book. 2022-10-01, ∼347🔥, 0💬
What Is Abelian Group
This section describes Abelian Group, which a set of elements with a binary operation satisfing 5 conditions. 2022-10-01, ∼345🔥, 0💬
What Is Key Encoding?
This section describes private and public key encoding standards: PKCS#8 is used for encoding private keys and X.509 is used for encoding public keys. 2022-10-06, ∼341🔥, 0💬
Popular Posts:
This section describes how JSP pages are processed by the Web server. Two key steps are involved: 1)...
It is lucky that the sheep is ranked eighth in the series of Chinese zodiac animals, for the number ...
This section provides a list of commonly used Android command line tools that can be executed on the...
Information on how to obtain the PDF version of this book, 'GB2312 Tutorials - Herong's Tutorial Exa...
Some samples of Unicode characters are provided here with their glyphs, code points, code names and ...