Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
Lee's Research Lab
Home
Topic_Cybersecurity
0_Elliptic Curve Cryptography (ECC)
1_Private and Public Key
2_Elliptic Curve Digital Signature Algorithm (ECDSA)
3_Tag Length Value (TLV)
4_ASN.1 Tag
5_ASN.1 Object Identifier Encoding and Decoding
6_Advanced Encryption Standard (AES)
7_Secure Hash Algorithm (SHA)
8_Rivest–Shamir–Adleman (RSA)
9_RSA_DigitalSignautre
10_Base64
11_Diffie Hellman Key Exchange (DHKE)
12_Secure Password Authenticated Key Exchange (SPAKE2+)
13_pkcs#5_#7 Padding Technique
14_Reverse Engineering of Certificate
15_Password-Based Key Derivation Function
20_Cyber Attack Scenario
Topic_BLE
1_Bluetooth OP GATT Flow
Topic_Make
0_Makefile_Overview
1_Built-in Expansion Functions
Topic_FreeRTOS
0_FreeRTOS_Overview
1_HeapMemoryManagement
2_Heap1
3_Heap2
4_Heap4
Lee's Tech Blog
Lee's Tech Blog
Topic_Cybersecurity
13_pkcs#5_#7 Padding Technique
pkcs#5_#7 Padding Technique
Table of contents
Definition
Reference
Terminology
Deep Dive
Definition
Reference
Please refer to the listed reference below. That help you understand what is Base64.
Terminology
Deep Dive