José A. Mañas > Cryptography > demos

1. Hash functions

1.1. Hash Machine

2. Symmetric cryptography (shared secret)

2.1. AES Machine

2.2. Meet in the middle

3. Asymmetric cryptography (public key)

3.1. RSA Machine

3.2. Elliptic curves

3.3. Elliptic curves (with small numbers)

4. Cryptography using BouncyCastle


José A. Mañas
jmanas@dit.upm.es
http://www.dit.upm.es/~pepe/