EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-07-06, 494👍, 3💬
tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication. 2019-05-10, 106👍, 1💬
Passing Values between JSP Pages
This section provides a tutorial example on how to use different ways to pass values between JSP pages: putting values in 'session' or 'application' objects, or putting values at the end of redirect URL. 2019-05-05, 793👍, 5💬
Downloading and Installing Notepad++ with XML Tools
This section provides a tutorial example on how to download and install Notepadd++ on Windows system; and how to add the XML Tools Plugin in Notepadd++. 2019-04-25, 143052👍, 64💬
Converting Secret Keys to and from Byte Arrays
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. They can be used to convert secret keys into byte arrays to store them in external files. 2019-04-22, 7438👍, 4💬
What Is HTTPS (Hypertext Transfer Protocol Secure)?
This section describes what is HTTPS (Hypertext Transfer Protocol Secure) - A communication protocol that uses the HTTP and the SSL/TLS protocols to provide encrypted communication and secure identification of a Web server. 2019-04-13, 212👍, 2💬
Outdated: Windows XP Component "Update Root Certificates"
This section describes the process used by Windows XP component, Update Root Certificates, to communicate to Windows Update Web site to fetch a trusted root certificate and install in on the local computer automatically. 2019-04-13, 253👍, 2💬
What Is DSA (Digital Signature Algorithm)?
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: generation of a pair of public key and private key; generation and verification of digital signature. 2019-04-09, 25655👍, 16💬
Compilation and Execution Process of C Programs
This section describes steps of the compilation and execution process of C programs: preprocessing, compilation, assembly, linking and loading. 2019-04-08, 57812👍, 25💬
RSA Private Key and Public Key Pair Sample
This section provides a tutorial example on how to run JcaKeyPair.java to generate a RSA private key and public key pair sample. Keys are stored PKCS#8 and X.509 encoding formats. 2019-04-03, 415👍, 2💬
What Is Block Cipher?
This section describes what is block cipher - An encryption scheme in which 'the clear text is broken up into blocks of fixed length, and encrypted one block at a time'. 2019-04-03, 166👍, 2💬
"native2ascii -encoding" - UTF-8 to \udddd Conversion
This section provides a tutorial example on how to convert UTF-8 character strings to \udddd Unicode code sequences with the 'native2ascii -encoding' command. 2019-03-25, 301👍, 2💬
This web site provides a collection of about 40 free tutorial books on programming languages, Web ap...
This section provides a tutorial example on how to download and install Notepadd++ on Windows system...
This section describes how to insert BLOB values as normal strings using INSERT statements.
This section provides a quick introduction of Web server log files with examples of IIS and Apache s...
Want to know when is the 2016 Chinese New Year day? Looking for Chinese calendars for 2016? Chinese ...