The definitive Wolfram Language and notebook experience
The original technical computing environment
All-in-one AI assistance for your Wolfram experience
We deliver solutions for the AI eraâcombining symbolic computation, data-driven insights and deep technology expertise.
Courses in computing, science, life and more
Learn, solve problems and share ideas.
News, views and insights from Wolfram
Resources for
Software DevelopersWe deliver solutions for the AI eraâcombining symbolic computation, data-driven insights and deep technology expertise.
Wolfram SolutionsCourses in computing, science, life and more
Learn, solve problems and share ideas.
News, views and insights from Wolfram
Resources for
Software DevelopersThe Wolfram Language's extensive base of state-of-the-art algorithms and efficient handling of very long integers make it uniquely suited to both research and implementation of cryptographic number theory.
Encryption and DecryptionPowerMod — compute modular powers of integers
PowerModList — compute modular inverses, with negative and fractional powers
PolynomialMod ▪ BitXor ▪ BitAnd ▪ BitOr ▪ BitSet ▪ BitGet
Key GenerationRandomPrime — pseudorandom prime
Prime — the n th prime
PrimeQ — test for primality
Mod ▪ JacobiSymbol ▪ PrimitiveRoot ▪ PrimitiveRootList ▪ CarmichaelLambda ▪ MoebiusMu
$CryptographicEllipticCurveNames — supported standard elliptic curves
CryptanalysisFactorInteger — complete or incomplete integer factorization
MultiplicativeOrder — compute the discrete logarithm
EulerPhi — Euler totient function
Reduce — solve multivariate quadratic polynomials
CharacterCounts — compute -gram frequencies
Lattice-Oriented ProblemsLatticeReduce — find short basis vectors in an integer lattice
LatticeData — properties of named lattices
Textual DataHash, FileHash — compute MD5 and other hash codes
ToCharacterCode, FromCharacterCode — convert between strings and character codes
ByteArray — raw array of arbitrary bytes
BaseDecode, BaseEncode — convert between a byte array and its Base64 representation
Other Forms of CryptographyCellularAutomaton — efficiently compute general block maps
Practical Cryptography »GenerateAsymmetricKeyPair — generate RSA, elliptic curve and other keys
Encrypt ▪ Decrypt ▪ PrivateKey ▪ PublicKey ▪ DigitalSignature ▪ ...
Related Tech Notes Related GuidesRetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4