top-image

Tag archives for base64

Java – Crypto : Encryption with Blowfish (Anonymization)
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
Java – Crypto : Encoding with base64, base64url, rfc-4648
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
bottom-img
Copyright ® 2012 Huseyin Ozveren. No reproduction, even partial, can be used from this site and all its contents including text, documents, images, etc.. without the express permission of the author.