An Introduction to Cryptography: ECIES and Elliptic Curve Encryption Algorithms

An Introduction to Cryptography: ECIES and Elliptic Curve Encryption Algorithms

IntroductionThis article quickly describes the basic knowledge of elliptic curve algorithms, extending to the principles and practical engineering applications of the commonly used ECIES integrated encryption framework. The aim is to keep it concise, avoiding unnecessary knowledge. A high school level understanding of mathematics is sufficient to read this article. Concepts such as finite fields … Read more

Three MIT Mathematicians Created This Powerful Cryptographic System

Three MIT Mathematicians Created This Powerful Cryptographic System

Have you ever wondered how a website generates a password after you enter “2333!@#¥” when setting it? How are the widely used encryption algorithms generated? How do they protect online financial activities worldwide? How do hackers decipher passwords? In fact, all of these stem from a mathematical problem. (Image source: veer图库) The Birth of Network … Read more

Configuring AP and STA in OpenWrt

Configuring AP and STA in OpenWrt

To configure a device in OpenWrt to function simultaneously as an AP (Access Point) and STA (Client) for network bridging, the following steps must be completed. This configuration allows the device to connect to an upstream WiFi (STA mode) while providing wireless access to downstream devices (AP mode), enabling network extension or use when a … Read more

Overview of Key Technologies in Physical Layer Security

Overview of Key Technologies in Physical Layer Security

Abstract The openness of wireless signal transmission enables seamless data transfer in wireless communications, but it also increases the risks of attacks, eavesdropping, and interference. In recent years, due to the randomness of physical layer channels, there is potential for it to replace traditional cryptographic encryption schemes that rely on extensive computation, and related research … Read more

Implementing Graph Structures in C: Adjacency Matrix and Adjacency List Representations

Implementing Graph Structures in C: Adjacency Matrix and Adjacency List Representations

Implementing Graph Structures in C: Adjacency Matrix and Adjacency List Representations In computer science, a graph is an important data structure used to represent relationships between objects. A graph consists of vertices (or nodes) and edges. Depending on different requirements, we can use various methods to represent a graph. In this article, we will introduce … Read more

AXI Hardware Accelerator for McEliece on FPGA Embedded Systems

AXI Hardware Accelerator for McEliece on FPGA Embedded Systems

01Introduction This academic sharing is based on the research work published by Enrique Cantó-Navarro and Mariano López-García in IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING in 2025. Paper Title:AXI Hardware Accelerator for McEliece on FPGA Embedded Systems Authors:Enrique Cantó-Navarro, Mariano López-García Source:《IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING》,DOI:10.1109/TDSC.2024.3445181 Value Rating: Method Innovation ★★★★☆ Engineering Value … Read more

Performance Analysis of Data Encryption Algorithms – Part 1

Performance Analysis of Data Encryption Algorithms - Part 1

This article compares the performance of four commonly used encryption algorithms: DES, 3DES, Blowfish, and AES (Rijndael). By running several encryption settings to process data blocks of different sizes, the encryption/decryption speeds of the algorithms are evaluated and compared. The simulation is conducted using C#. Keywords: Encryption Algorithms, Performance, Analysis, AES, DES, Blowfish, TripleDES, Cryptography … Read more

Keccak-tiny: A Lightweight C++ Library

Keccak-tiny: A Lightweight C++ Library

Keccak-tiny: A Lightweight C++ Library Keccak-tiny is a C++ library based on the Keccak algorithm, known for its simplicity and efficiency. The Keccak algorithm is a powerful hashing algorithm widely used in the field of cryptography. Keccak-tiny provides an easy-to-use interface, allowing developers to easily implement secure data hashing in their projects. Next, let’s delve … Read more

Rust Cryptography Libraries: A Comprehensive Guide

Rust Cryptography Libraries: A Comprehensive Guide

Rust Cryptography Libraries: A Comprehensive Guide Cryptography refers to the process of converting information into a secure format, primarily achieved through encryption. It ensures that data transmitted over the network is secure and reliable. Although Rust has a random number generator, the most commonly used suite today is OpenSSL. As this guide shows, the Rust … Read more

Implementation Strategies for Secure Boot in Automotive Information Security

Implementation Strategies for Secure Boot in Automotive Information Security

Introduction Are you aware of the following: What is the significance of automotive information security? What is the main purpose of Secure Boot? What are the conventional implementation solutions for Secure Boot? In this article, we will explore and answer these questions together. For better understanding, here is the outline of the article: ▍Main Content … Read more