OpenPGP

Libgcrypt

Libgcrypt is a cryptography library developed as a separated module of GnuPG.It can also be used independently of GnuPG, but depends on its error-reporting library Libgpg-error. It provides functions for all fundamental cryptographic building blocks: Libgcrypt features its own multiple precision arithmetic implementation, with assembler implementations for a variety of processors, including Alpha, AMD64, HP PA-RISC, i386, i586, M68K, MIPS 3, PowerPC, and SPARC. It also features an entropy gathering utility, coming in different versions for Unix-like and Windows machines. Usually multiple, stable branches of Libgcrypt are maintained in parallel; since 2022-03-28 this is the Libgrypt 1.10 branch as stable branch, plus the 1.8 branch as LTS ("long-term support") branch, which will be maintained at least until 2024-12-31. (Wikipedia).

Video thumbnail

3D Printed Speaker

My 3D printed DIY speaker design. Tutorial: https://youtu.be/bmT21EHKQuM

From playlist 3D Printing

Video thumbnail

JupyterLab Opening Files

Meeting of the Jupyter/IPython development team.

From playlist JupyterLab Documentation

Video thumbnail

Color and Refraction

What is color? What is it that determines the color of an object? And what the heck is refraction? Good thing we just learned about electromagnetic radiation! Especially the visible spectrum. Let's take a look. Watch the whole Classical Physics playlist: http://bit.ly/ProfDavePhysics1 Mo

From playlist Classical Physics

Video thumbnail

logarithm of a matrix

logarithm of a matrix. I calculate ln of a matrix by finding the eigenvalues and eigenvectors of that matrix and by using diagonalization. It's a very powerful tool that allows us to find exponentials, sin, cos, and powers of a matrix and relates to Fibonacci numbers as well. This is a mus

From playlist Eigenvalues

Video thumbnail

Finding Eigenvalues and Eigenvectors

In studying linear algebra, we will inevitably stumble upon the concept of eigenvalues and eigenvectors. These sound very exotic, but they are very important not just in math, but also physics. Let's learn what they are, and how to find them! Script by Howard Whittle Watch the whole Math

From playlist Mathematics (All Of It)

Video thumbnail

Divisibility, Prime Numbers, and Prime Factorization

Now that we understand division, we can talk about divisibility. A number is divisible by another if their quotient is a whole number. The smaller number is a factor of the larger one, but are there numbers with no factors at all? There's some pretty surprising stuff in this one! Watch th

From playlist Mathematics (All Of It)

Video thumbnail

Linear Transformations on Vector Spaces

Remember when we learned about functions in algebra? Now we will learn something analogous for linear algebra, linear transformations. These take in some input vector and spit out something else. Let's learn how to use these! Script by Howard Whittle Watch the whole Mathematics playlist:

From playlist Mathematics (All Of It)

Video thumbnail

Matrix Multiplication and Associated Properties

We covered matrix addition, so how do we multiply two matrices together? It's not as straightforward as you might guess, so let's make sure we have this algorithm down! Watch the whole Mathematics playlist: http://bit.ly/ProfDaveMath Classical Physics Tutorials: http://bit.ly/ProfDavePhy

From playlist Mathematics (All Of It)

Related pages

GOST (block cipher) | Stream cipher | Argon2 | Key wrap | Scrypt | GOST (hash function) | Twofish | ElGamal encryption | International Data Encryption Algorithm | Cyclic redundancy check | MD5 | Balloon hashing | SM4 (cipher) | Curve25519 | Block cipher mode of operation | RC2 | Serpent (cipher) | Blowfish (cipher) | PBKDF2 | Triple DES | SEED | BLAKE2 | Digital Signature Algorithm | SHA-3 | SHA-1 | Streebog | CCM mode | Galois/Counter Mode | Arbitrary-precision arithmetic | Hash function | OCB mode | SHA-2 | Camellia (cipher) | Message authentication code | Comparison of cryptography libraries | CAST-128 | Poly1305 | RC4 | SECG | EdDSA | MD4 | Key derivation function | Entropy (computing) | Salsa20 | Symmetric-key algorithm | HMAC | CMAC | SM3 (hash function) | Curve448 | RIPEMD | Ephemeral key | EAX mode | Public-key cryptography | Advanced Encryption Standard | Data Encryption Standard