Site Map
Index:
About Us | Base64 | BigDigits | Blowfish | C programming | Computer security | Contact | CRC-32 | Cross-platform encryption | CRT | Cryptography | crypt(3) | CryptoSys API | CryptoSys PKI | FirmaSAT | SC14N | xmlsq | David Ireland | DBXanalyzer | Diffie-Hellman | Email Us | Home | International characters | Keys | Links | MD5 | Microsoft Access | MIMEanalyze | MySecret | Number Theory | Outlook Express | Padding | Passwords | Perl | PKI | Projects | RSA | Site | Su Doku | Terms | Utilities | VB Programming | Wclock | Web Programming | Web Sites | Windows | XHTML | XMLDSIG |
- Home
- About Us
- Cryptography Code
- Blowfish: a Visual Basic VB6 version
- MySecret: a freeware command-line encryption utility using Blowfish
- RSA algorithm notes and advice on its use
- MD5 in Visual Basic
- Unix crypt(3) password encryption program
- Cyclic Redundancy Code algorithms CRC-32, CRC-16 and CRC-24
- Base64 encoding
- Encrypting credit card numbers using Feistel Finite Set Encryption Mode (FFSEM)
- How to convert VBA/VB6 Unicode strings to UTF-8
- Cryptography Articles
- Cryptography with International character sets
- Cross-Platform Encryption
- Using keys in cryptography: a brief introduction to keys and passwords
- Using padding in cryptography
- Encryption in XML documents using XMLENC
- Signing an XML document using XMLDSIG (Part 1)
- Signing an XML document using XMLDSIG (Part 2)
- Signing an XML document using XMLDSIG (Part 3)
- Troubleshooting problems on the 'Online XML Digital Signature Verifier' site
- Test vectors for SHA-1, SHA-2 and SHA-3
- Poly1305 authenticator
- X9.42 Test Vectors Are Wrong
- Public key cryptography using discrete logarithms
- CryptoSysTM
- C programming
- Utilities
- Mathematics
- Elementary number theory
- The Euclidean Algorithm and the Extended Euclidean Algorithm
- The Chinese Remainder Theorem (CRT) and Gauss's algorithm
- Using the CRT with RSA
- RSA: how to factorize N given d
- Computing a cube root in hexadecimal
- Number theory: The multiplicative group modulo p
- Number theory: Solving (:-) the discrete logarithm problem with bdcalc
- Number theory: A Dirichlet character table generator
- Coding Theory: Transforming a generator matrix to standard form
- Linear algebra: Transform a matrix to row canonical form
- The theory behind Transforming a matrix to reduced row echelon form
- De Morgan's laws explained in graphical form
- An on-line calculator for the chi-square distribution
- Binomial distribution calculator
- Miscellaneous Computing Stuff
- Links
- DBXanalyzer
- Wclock
- BigDigits multiple-precision arithmetic source code
- Su Doku
- XML is xhite
- About This Site
- Terms
- Contact
This page last updated 20 March 2022