Solved


Convert a structure into a string
Convert the contents of each fields into a string. Example with an input structure s with 2 fields : s.age = '33' s....

5 months ago

Solved


Pig Latin to English Translator
Pig latin is a faux-language based off of English. The rules are as follows (excerpted from the <http://en.wikipedia.org/wiki/Pi...

5 months ago

Solved


English to Pig Latin Translator
Pig latin is a faux-language based off of English. The rules are as follows (excerpted from the wikipedia entry for Pig Latin): ...

5 months ago

Solved


Formatting currency numbers
Given a number, format it properly for textual display using the notation $xxx,xxx,xxx.xx. Assume that no more than two digits ...

5 months ago

Solved


Bang Bang in Bangalore
Imagine a strange language disorder, Bangolangosis, has developed among trigonometricians of <http://en.wikipedia.org/wiki/Banga...

5 months ago

Solved


Determine RSA keys (public and private) given two prime number character strings (p and q)
Given two prime number character strings (p and q), generate the RSA public and private keys (n and d) with e = 65537. The more ...

5 months ago

Solved


Create State Array for initiating SHA-3-224 Hash
Create binary represented state array (as the initial input to the sponge function (f)) from any length character array (N) with...

5 months ago

Solved


RSA encryption using public key
Encrypt the message text by converting to uint8 matrix using UTF-8 representation. Convert uint8 matrix to a large integer strin...

5 months ago

Solved


RSA decryption
Decrypt a large integer string using RSA decryption given the public key (n) and private key (d). Convert the large integer decr...

5 months ago

Solved


Mask Generation Function (MGF1) for PKCS #1 Standard utilizing Optimal Asymmetric Encryption Padding for RSA Cryptography
Create Mask Generation Function (MGF1) from PKCS #1 v2.2 standard (B.2.1 page 50) at below link. Input will be character array (...

5 months ago

Solved


Optimal Asymmetric Encryption Padding of message for RSA Cryptography
EME-OAEP encoding of input message using a Feistel network with SHA-1 hashing within the mask generation function (MGF1) (see pr...

5 months ago

Solved


Optimal Asymmetric Encryption Padding decoding of message for RSA Cryptography
EME-OAEP decoding by reversing the Feistel network using previously determined mask generation function (MGF1) and SHA-1 hashing...

5 months ago

Solved


Obtain the Bitcoin address associated to a given private key
All the information you need is at <https://en.bitcoin.it/wiki/Address> and you may also find helpful <https://brainwal...

5 months ago

Solved


Find and replaces spaces from a input string with *
For a given input string str, find how many spaces are there in the string and replace those spaces with * e.g. str = 'this is ...

5 months ago

Solved


Sum of all the divisors of n

5 months ago

Solved


Montgomery Multiplication

5 months ago

Solved


RIPEMD160 Hash
Generator the RIPEMD160 hash given an input string and output the hexadecimal RIPEMD160 hash. For example: Input='My name is...

5 months ago

Solved


SHA256 Hashing
Conduct SHA256 hashing on a hexadecimal input to produce a 256-bit hexadecimal output. Example: hash = SHA256('aa') hash ...

5 months ago

Solved


Binary Array to Hex Representation
Given a binary array of bytes (lsb to msb), convert it into a hexadecimal representation (msb to lsb). For example: Input: [1 ...

5 months ago

Solved


String to Binary Representation
Given a string, convert it using UTF-8 into a binary array where each character or byte is arraigned low to high. For example: ...

5 months ago

Solved


AES-256 KeyExpansion()
Given a 32-byte hexadecimal character array representing the AES-256 input key, execute the AES-256 algorithm, KeyExpansion() an...

5 months ago

Solved


AES MixColumns() Transformation
Given a 16x2 input character hexadecimal array representing the AES state, execute the AES algorithm MixColumns() transformation...

5 months ago

Solved


AES SubBytes() Transformation
Given a 16x2 input character hexadecimal array representing the AES state, execute the AES algorithm SubBytes() transformation a...

5 months ago

Solved


Elliptic Curve Cryptography (ECC) Point Addition
Given two points (P and Q, they can be the same points on the elliptic curve), compute ECC point addition on a Weierstrass ellip...

5 months ago

Load more