Hi FrankRizzo....
This is what I got from Krypto..
BASE64 table :: 00187ED8 :: 00587ED8
	The reference is above.
CRC32 :: 00142950 :: 00542950
	Referenced at 004CF5D6
	Referenced at 004CF5EB
	Referenced at 004CF604
	Referenced at 004CF61D
	Referenced at 004CF636
	Referenced at 004CF64F
	Referenced at 004CF668
	Referenced at 004CF681
	Referenced at 004CF6B0
CryptGenRandom [Name] :: 001555B0 :: 005555B0
	Referenced at 00501638
ECC: B-163 (NIST), point order :: 00151978 :: 00551978
	Referenced at 00554144
ECC: B-233 (NIST), point order :: 00151474 :: 00551474
	Referenced at 00554230
ECC: B-283 (NIST), point order :: 00151058 :: 00551058
	Referenced at 005542C8
ECC: B-409 (NIST), point order :: 00150C40 :: 00550C40
	Referenced at 00554334
ECC: B-571 (NIST), point order :: 001506C8 :: 005506C8
	Referenced at 005543A0
ECC: c2pnb163v1 (X 9.62), point order :: 001505C0 :: 005505C0
	Referenced at 005543E0
ECC: c2pnb163v2 (X 9.62), point order :: 001504BC :: 005504BC
	Referenced at 00554420
ECC: c2pnb163v3 (X 9.62), point order :: 001503E0 :: 005503E0
	Referenced at 00554460
ECC: c2pnb208w1 (X 9.62), point order :: 0014FDE2 :: 0054FDE2
	The reference is above.
ECC: c2pnb272w1 (X 9.62), point order :: 0014F7E2 :: 0054F7E2
	The reference is above.
ECC: c2pnb368w1 (X 9.62), point order :: 0014F10A :: 0054F10A
	The reference is above.
ECC: c2tnb191v1 (X 9.62), point order :: 00150160 :: 00550160
	Referenced at 005544CC
ECC: c2tnb191v2 (X 9.62), point order :: 00150034 :: 00550034
	Referenced at 0055450C
	Referenced at 005FCB44
	Referenced at 006646B8
	Referenced at 006AF02E
	Referenced at 0082A82C
	Referenced at 008A5C08
	Referenced at 009D7EC0
	Referenced at 009ECF6A
	Referenced at 00A335C2
	Referenced at 00AA6784
ECC: c2tnb191v3 (X 9.62), point order :: 0014FF30 :: 0054FF30
	Referenced at 0055454C
	Referenced at 0090A664
ECC: c2tnb239v1 (X 9.62), point order :: 0014FC38 :: 0054FC38
	Referenced at 005545B8
ECC: c2tnb239v2 (X 9.62), point order :: 0014FAD0 :: 0054FAD0
	Referenced at 005545F8
ECC: c2tnb239v3 (X 9.62), point order :: 0014F990 :: 0054F990
	Referenced at 00554638
ECC: c2tnb359v1 (X 9.62), point order :: 0014F370 :: 0054F370
	Referenced at 005546D0
ECC: c2tnb431r1 (X 9.62), point order :: 0014EE40 :: 0054EE40
	Referenced at 00554728
ECC: K-163 (NIST), point order :: 00151B60 :: 00551B60
	Referenced at 005540C4
ECC: K-233 (NIST), point order :: 001515EA :: 005515EA
	The reference is above.
ECC: K-283 (NIST), point order :: 00151210 :: 00551210
	Referenced at 00554288
ECC: K-409 (NIST), point order :: 00150E9A :: 00550E9A
	The reference is above.
ECC: K-571 (NIST), point order :: 001509E8 :: 005509E8
	Referenced at 00554360
ECC: P-192 (NIST), prime order :: 0015393C :: 0055393C
	Referenced at 00553AA4
ECC: P-192 v2 (X 9.62), base point x-coord :: 0015311C :: 0055311C
	Referenced at 00553B9C
ECC: P-192 v3 (X 9.62), prime order :: 00152FBC :: 00552FBC
	Referenced at 00553BE4
ECC: P-224 (NIST), prime order :: 001537A0 :: 005537A0
	Referenced at 00553AE4
	Referenced at 00553F98
ECC: P-239 v1 (X 9.62), prime order :: 00152E3C :: 00552E3C
	Referenced at 00553C24
ECC: P-239 v2 (X 9.62), prime order :: 00152D14 :: 00552D14
	Referenced at 00553C64
ECC: P-239 v3 (X 9.62), prime order :: 00152C14 :: 00552C14
	Referenced at 00553CA4
ECC: P-256 (NIST), prime order :: 00152A68 :: 00552A68
	Referenced at 00553CE4
ECC: P-384 (NIST), prime order :: 00153508 :: 00553508
	Referenced at 00553B24
ECC: P-521 (NIST), prime order :: 001531B0 :: 005531B0
	Referenced at 00553B64
ECC: secp112r1 (SEC2), prime order :: 0015297C :: 0055297C
	Referenced at 00553D24
ECC: secp112r2 (SEC2), prime order :: 001528B0 :: 005528B0
	Referenced at 00553D64
ECC: secp128r1 (SEC2), prime order :: 001527B0 :: 005527B0
	Referenced at 00553DA4
ECC: secp128r2 (SEC2), prime order :: 001526D4 :: 005526D4
	Referenced at 00553DE4
ECC: secp160k1 (SEC2), prime order :: 00152620 :: 00552620
	Referenced at 00553E10
ECC: secp160r1 (SEC2), prime order :: 001524F0 :: 005524F0
	Referenced at 00553E50
ECC: secp160r2 (SEC2), prime order :: 00152414 :: 00552414
	Referenced at 00553E90
ECC: secp192k1 (SEC2), prime order :: 00152318 :: 00552318
	Referenced at 00553EBC
ECC: secp224k1 (SEC2), prime order :: 001521FC :: 005521FC
	Referenced at 00553EE8
ECC: secp256k1 (SEC2), prime order :: 001520B8 :: 005520B8
	Referenced at 00553F14
ECC: sect113r1 (SEC2), point order :: 00151EB8 :: 00551EB8
	Referenced at 00553FD8
ECC: sect113r2 (SEC2), point order :: 00151DF0 :: 00551DF0
	Referenced at 00554018
ECC: sect131r1 (SEC2), point order :: 00151D18 :: 00551D18
	Referenced at 00554058
ECC: sect131r2 (SEC2), point order :: 00151C38 :: 00551C38
	Referenced at 00554098
ECC: sect163r1 (SEC2), point order :: 00151A50 :: 00551A50
	Referenced at 00554104
ECC: sect193r1 (SEC2), point order :: 00151814 :: 00551814
	Referenced at 00554184
ECC: sect193r2 (SEC2), point order :: 001516E8 :: 005516E8
	Referenced at 005541C4
ECC: sect239k1 (SEC2), point order :: 00151374 :: 00551374
	Referenced at 0055425C
FORK-256 [mixing] :: 001073F9 :: 005073F9
	The reference is above.
FORK-256 [mixing] :: 00107B87 :: 00507B87
	The reference is above.
List of primes [long] :: 001564A8 :: 005564A8
	The reference is above.
MD5 :: 00119248 :: 00519248
	The reference is above.
RIJNDAEL [T1] :: 001472A8 :: 005472A8
	Referenced at 004E7ABE
	Referenced at 004E7AF4
	Referenced at 004E7B3A
	Referenced at 004E7B74
	Referenced at 004E7BDC
	Referenced at 004E7C15
	Referenced at 004E7C59
	Referenced at 004E7CAA
	Referenced at 004E7CE4
	Referenced at 004E7D1E
	Referenced at 004E7D64
	Referenced at 004E7D8E
SHA1 [Compress] :: 0011B5D6 :: 0051B5D6
	The reference is above.
SHA-224 [Init] :: 00107298 :: 00507298
	The reference is above.
SHA-256 [mixing] :: 00155FA8 :: 00555FA8
	The reference is above.
SHA-384 [Init] :: 00109258 :: 00509258
	The reference is above.
SHA-512 [init] :: 001092F8 :: 005092F8
	The reference is above.
{Big number} :: 0014EC44 :: 0054EC44
	Referenced at 005547AC
{Big number} :: 0014ED2C :: 0054ED2C
	Referenced at 00554780
{Big number} :: 0014EDD8 :: 0054EDD8
	Referenced at 00554750
{Big number} :: 0014EDF8 :: 0054EDF8
	Referenced at 0055474C
{Big number} :: 0014EEB0 :: 0054EEB0
	Referenced at 00554724
{Big number} :: 0014F168 :: 0054F168
	Referenced at 005546F8
{Big number} :: 0014F3D0 :: 0054F3D0
	Referenced at 005546CC
{Big number} :: 0014F5D8 :: 0054F5D8
	Referenced at 00554690
{Big number} :: 0014F628 :: 0054F628
	Referenced at 0055468C
{Big number} :: 0014F678 :: 0054F678
	Referenced at 00554688
{Big number} :: 0014F6C8 :: 0054F6C8
	Referenced at 00554684
{Big number} :: 0014F718 :: 0054F718
	Referenced at 00554680
{Big number} :: 0014F828 :: 0054F828
	Referenced at 00554660
{Big number} :: 0014F9D0 :: 0054F9D0
	Referenced at 00554634
{Big number} :: 0014FB10 :: 0054FB10
	Referenced at 005545F4
	Referenced at 009001F2
{Big number} :: 0014FC78 :: 0054FC78
	Referenced at 005545B4
{Big number} :: 0014FE18 :: 0054FE18
	Referenced at 00554574
{Big number} :: 0014FF64 :: 0054FF64
	Referenced at 00554548
{Big number} :: 00150068 :: 00550068
	Referenced at 00554508
	Referenced at 00618EEE
	Referenced at 00633EB6
	Referenced at 006D298C
	Referenced at 007D3874
	Referenced at 0080D3A6
	Referenced at 0095DD80
	Referenced at 009BD086
{Big number} :: 00150194 :: 00550194
	Referenced at 005544C8
{Big number} :: 001502C0 :: 005502C0
	Referenced at 0055448C
{Big number} :: 001502F0 :: 005502F0
	Referenced at 00554488
	Referenced at 0071CD42
{Big number} :: 00150320 :: 00550320
	Referenced at 00554484
{Big number} :: 00150350 :: 00550350
	Referenced at 00554480
{Big number} :: 00150380 :: 00550380
	Referenced at 0055447C
{Big number} :: 0015040C :: 0055040C
	Referenced at 0055445C
{Big number} :: 001504E8 :: 005504E8
	Referenced at 0055441C
{Big number} :: 001505EC :: 005505EC
	Referenced at 005543DC
{Big number} :: 00151FC8 :: 00551FC8
	Referenced at 00553F6C
{Big number} :: 00152C54 :: 00552C54
	Referenced at 00553CA0
{Big number} :: 00152D54 :: 00552D54
	Referenced at 00553C60
{Big number} :: 00152E7C :: 00552E7C
	Referenced at 00553C20
{Big number} :: 00152FF0 :: 00552FF0
	Referenced at 00553BE0
{Big number} :: 001530B4 :: 005530B4
	Referenced at 00553BA4
{Big number} :: 001530E8 :: 005530E8
	Referenced at 00553BA0
----------------------------------------------------------------------------------
#include <idc.idc>
static main(void)
{
	auto slotidx;
	slotidx = 1;
	MarkPosition(0x00587ED8, 0, 0, 0, slotidx + 0, "BASE64 table"

;
	MakeComm(PrevNotTail(0x00587ED9), "BASE64 table\nBASE64 encoding (used e.g. in e-mails - MIME)"

;
	MarkPosition(0x00542950, 0, 0, 0, slotidx + 1, "CRC32"

;
	MakeComm(PrevNotTail(0x00542951), "CRC32\nCRC32 precomputed table for byte transform"

;
	MarkPosition(0x005555B0, 0, 0, 0, slotidx + 2, "CryptGenRandom [Name]"

;
	MakeComm(PrevNotTail(0x005555B1), "CryptGenRandom [Name]\nMicrosoft CryptoAPI function name"

;
	MarkPosition(0x00551978, 0, 0, 0, slotidx + 3, "ECC"

;
	MakeComm(PrevNotTail(0x00551979), "ECC\nNIST-recommended elliptic curve over binary field, point order of B-163 curve"

;
	MarkPosition(0x00551474, 0, 0, 0, slotidx + 4, "ECC"

;
	MakeComm(PrevNotTail(0x00551475), "ECC\nNIST-recommended elliptic curve over binary field, point order of B-233 curve"

;
	MarkPosition(0x00551058, 0, 0, 0, slotidx + 5, "ECC"

;
	MakeComm(PrevNotTail(0x00551059), "ECC\nNIST-recommended elliptic curve over binary field, point order of B-283 curve"

;
	MarkPosition(0x00550C40, 0, 0, 0, slotidx + 6, "ECC"

;
	MakeComm(PrevNotTail(0x00550C41), "ECC\nNIST-recommended elliptic curve over binary field, point order of B-409 curve"

;
	MarkPosition(0x005506C8, 0, 0, 0, slotidx + 7, "ECC"

;
	MakeComm(PrevNotTail(0x005506C9), "ECC\nNIST-recommended elliptic curve over binary field, point order of B-571 curve"

;
	MarkPosition(0x005505C0, 0, 0, 0, slotidx + 8, "ECC"

;
	MakeComm(PrevNotTail(0x005505C1), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2pnb163v1 curve"

;
	MarkPosition(0x005504BC, 0, 0, 0, slotidx + 9, "ECC"

;
	MakeComm(PrevNotTail(0x005504BD), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2pnb163v2 curve"

;
	MarkPosition(0x005503E0, 0, 0, 0, slotidx + 10, "ECC"

;
	MakeComm(PrevNotTail(0x005503E1), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2pnb163v3 curve"

;
	MarkPosition(0x0054FDE2, 0, 0, 0, slotidx + 11, "ECC"

;
	MakeComm(PrevNotTail(0x0054FDE3), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2pnb208w1 curve"

;
	MarkPosition(0x0054F7E2, 0, 0, 0, slotidx + 12, "ECC"

;
	MakeComm(PrevNotTail(0x0054F7E3), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2pnb272w1 curve"

;
	MarkPosition(0x0054F10A, 0, 0, 0, slotidx + 13, "ECC"

;
	MakeComm(PrevNotTail(0x0054F10B), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2pnb368w1 curve"

;
	MarkPosition(0x00550160, 0, 0, 0, slotidx + 14, "ECC"

;
	MakeComm(PrevNotTail(0x00550161), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb191v1 curve"

;
	MarkPosition(0x00550034, 0, 0, 0, slotidx + 15, "ECC"

;
	MakeComm(PrevNotTail(0x00550035), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb191v2 curve"

;
	MarkPosition(0x0054FF30, 0, 0, 0, slotidx + 16, "ECC"

;
	MakeComm(PrevNotTail(0x0054FF31), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb191v3 curve"

;
	MarkPosition(0x0054FC38, 0, 0, 0, slotidx + 17, "ECC"

;
	MakeComm(PrevNotTail(0x0054FC39), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb239v1 curve"

;
	MarkPosition(0x0054FAD0, 0, 0, 0, slotidx + 18, "ECC"

;
	MakeComm(PrevNotTail(0x0054FAD1), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb239v2 curve"

;
	MarkPosition(0x0054F990, 0, 0, 0, slotidx + 19, "ECC"

;
	MakeComm(PrevNotTail(0x0054F991), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb239v3 curve"

;
	MarkPosition(0x0054F370, 0, 0, 0, slotidx + 20, "ECC"

;
	MakeComm(PrevNotTail(0x0054F371), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb359v1 curve"

;
	MarkPosition(0x0054EE40, 0, 0, 0, slotidx + 21, "ECC"

;
	MakeComm(PrevNotTail(0x0054EE41), "ECC\nX 9.62 EC-DSA elliptic curve over binary field, point order of c2tnb431r1 curve"

;
	MarkPosition(0x00551B60, 0, 0, 0, slotidx + 22, "ECC"

;
	MakeComm(PrevNotTail(0x00551B61), "ECC\nNIST-recommended elliptic curve over binary field, point order of K-163 curve"

;
	MarkPosition(0x005515EA, 0, 0, 0, slotidx + 23, "ECC"

;
	MakeComm(PrevNotTail(0x005515EB), "ECC\nNIST-recommended elliptic curve over binary field, point order of K-233 curve"

;
	MarkPosition(0x00551210, 0, 0, 0, slotidx + 24, "ECC"

;
	MakeComm(PrevNotTail(0x00551211), "ECC\nNIST-recommended elliptic curve over binary field, point order of K-283 curve"

;
	MarkPosition(0x00550E9A, 0, 0, 0, slotidx + 25, "ECC"

;
	MakeComm(PrevNotTail(0x00550E9B), "ECC\nNIST-recommended elliptic curve over binary field, point order of K-409 curve"

;
	MarkPosition(0x005509E8, 0, 0, 0, slotidx + 26, "ECC"

;
	MakeComm(PrevNotTail(0x005509E9), "ECC\nNIST-recommended elliptic curve over binary field, point order of K-571 curve"

;
	MarkPosition(0x0055393C, 0, 0, 0, slotidx + 27, "ECC"

;
	MakeComm(PrevNotTail(0x0055393D), "ECC\nNIST-recommended elliptic curve over prime field, prime order of P-192 curve"

;
	MarkPosition(0x0055311C, 0, 0, 0, slotidx + 28, "ECC"

;
	MakeComm(PrevNotTail(0x0055311D), "ECC\nX 9.62 EC-DSA elliptic curve over prime field, base point x-coordinate of P-192 v2 curve"

;
	MarkPosition(0x00552FBC, 0, 0, 0, slotidx + 29, "ECC"

;
	MakeComm(PrevNotTail(0x00552FBD), "ECC\nX 9.62 EC-DSA elliptic curve over prime field, prime order of P-192 v3 curve"

;
	MarkPosition(0x005537A0, 0, 0, 0, slotidx + 30, "ECC"

;
	MakeComm(PrevNotTail(0x005537A1), "ECC\nNIST-recommended elliptic curve over prime field, prime order of P-224 curve"

;
	MarkPosition(0x00552E3C, 0, 0, 0, slotidx + 31, "ECC"

;
	MakeComm(PrevNotTail(0x00552E3D), "ECC\nX 9.62 EC-DSA elliptic curve over prime field, prime order of P-239 v1 curve"

;
	MarkPosition(0x00552D14, 0, 0, 0, slotidx + 32, "ECC"

;
	MakeComm(PrevNotTail(0x00552D15), "ECC\nX 9.62 EC-DSA elliptic curve over prime field, prime order of P-239 v2 curve"

;
	MarkPosition(0x00552C14, 0, 0, 0, slotidx + 33, "ECC"

;
	MakeComm(PrevNotTail(0x00552C15), "ECC\nX 9.62 EC-DSA elliptic curve over prime field, prime order of P-239 v3 curve"

;
	MarkPosition(0x00552A68, 0, 0, 0, slotidx + 34, "ECC"

;
	MakeComm(PrevNotTail(0x00552A69), "ECC\nNIST-recommended elliptic curve over prime field, prime order of P-256 curve"

;
	MarkPosition(0x00553508, 0, 0, 0, slotidx + 35, "ECC"

;
	MakeComm(PrevNotTail(0x00553509), "ECC\nNIST-recommended elliptic curve over prime field, prime order of P-384 curve"

;
	MarkPosition(0x005531B0, 0, 0, 0, slotidx + 36, "ECC"

;
	MakeComm(PrevNotTail(0x005531B1), "ECC\nNIST-recommended elliptic curve over prime field, prime order of P-521 curve"

;
	MarkPosition(0x0055297C, 0, 0, 0, slotidx + 37, "ECC"

;
	MakeComm(PrevNotTail(0x0055297D), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp112r1 curve"

;
	MarkPosition(0x005528B0, 0, 0, 0, slotidx + 38, "ECC"

;
	MakeComm(PrevNotTail(0x005528B1), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp112r2 curve"

;
	MarkPosition(0x005527B0, 0, 0, 0, slotidx + 39, "ECC"

;
	MakeComm(PrevNotTail(0x005527B1), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp128r1 curve"

;
	MarkPosition(0x005526D4, 0, 0, 0, slotidx + 40, "ECC"

;
	MakeComm(PrevNotTail(0x005526D5), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp128r2 curve"

;
	MarkPosition(0x00552620, 0, 0, 0, slotidx + 41, "ECC"

;
	MakeComm(PrevNotTail(0x00552621), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp160k1 curve"

;
	MarkPosition(0x005524F0, 0, 0, 0, slotidx + 42, "ECC"

;
	MakeComm(PrevNotTail(0x005524F1), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp160r1 curve"

;
	MarkPosition(0x00552414, 0, 0, 0, slotidx + 43, "ECC"

;
	MakeComm(PrevNotTail(0x00552415), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp160r2 curve"

;
	MarkPosition(0x00552318, 0, 0, 0, slotidx + 44, "ECC"

;
	MakeComm(PrevNotTail(0x00552319), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp192k1 curve"

;
	MarkPosition(0x005521FC, 0, 0, 0, slotidx + 45, "ECC"

;
	MakeComm(PrevNotTail(0x005521FD), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp224k1 curve"

;
	MarkPosition(0x005520B8, 0, 0, 0, slotidx + 46, "ECC"

;
	MakeComm(PrevNotTail(0x005520B9), "ECC\nCerticom SEC2 elliptic curve over prime field, prime order of secp256k1 curve"

;
	MarkPosition(0x00551EB8, 0, 0, 0, slotidx + 47, "ECC"

;
	MakeComm(PrevNotTail(0x00551EB9), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect113r1 curve"

;
	MarkPosition(0x00551DF0, 0, 0, 0, slotidx + 48, "ECC"

;
	MakeComm(PrevNotTail(0x00551DF1), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect113r2 curve"

;
	MarkPosition(0x00551D18, 0, 0, 0, slotidx + 49, "ECC"

;
	MakeComm(PrevNotTail(0x00551D19), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect131r1 curve"

;
	MarkPosition(0x00551C38, 0, 0, 0, slotidx + 50, "ECC"

;
	MakeComm(PrevNotTail(0x00551C39), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect131r2 curve"

;
	MarkPosition(0x00551A50, 0, 0, 0, slotidx + 51, "ECC"

;
	MakeComm(PrevNotTail(0x00551A51), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect163r1 curve"

;
	MarkPosition(0x00551814, 0, 0, 0, slotidx + 52, "ECC"

;
	MakeComm(PrevNotTail(0x00551815), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect193r1 curve"

;
	MarkPosition(0x005516E8, 0, 0, 0, slotidx + 53, "ECC"

;
	MakeComm(PrevNotTail(0x005516E9), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect193r2 curve"

;
	MarkPosition(0x00551374, 0, 0, 0, slotidx + 54, "ECC"

;
	MakeComm(PrevNotTail(0x00551375), "ECC\nCerticom SEC2 elliptic curve over binary field, point order of sect239k1 curve"

;
	MarkPosition(0x005073F9, 0, 0, 0, slotidx + 55, "FORK-256 [mixing]"

;
	MakeComm(PrevNotTail(0x005073FA), "FORK-256 [mixing]\nFORK-256 mixing constants (subset of SHA-256)"

;
	MarkPosition(0x00507B87, 0, 0, 0, slotidx + 56, "FORK-256 [mixing]"

;
	MakeComm(PrevNotTail(0x00507B88), "FORK-256 [mixing]\nFORK-256 mixing constants (subset of SHA-256)"

;
	MarkPosition(0x005564A8, 0, 0, 0, slotidx + 57, "List of primes [long]"

;
	MakeComm(PrevNotTail(0x005564A9), "List of primes [long]\nAll prime numbers up to 251"

;
	MarkPosition(0x00519248, 0, 0, 0, slotidx + 58, "MD5"

;
	MakeComm(PrevNotTail(0x00519249), "MD5\nMD5 transform (\"compress\"

 constants"

;
	MarkPosition(0x005472A8, 0, 0, 0, slotidx + 59, "RIJNDAEL [T1]"

;
	MakeComm(PrevNotTail(0x005472A9), "RIJNDAEL [T1]\nRIJNDAEL (AES): encoding table 1; also used in other ciphers (e.g. SNOW 2.0)"

;
	MarkPosition(0x0051B5D6, 0, 0, 0, slotidx + 60, "SHA1 [Compress]"

;
	MakeComm(PrevNotTail(0x0051B5D7), "SHA1 [Compress]\nSHA1 additive constants (also used in SHA, SEAL, partly in RIPEMD)"

;
	MarkPosition(0x00507298, 0, 0, 0, slotidx + 61, "SHA-224 [Init]"

;
	MakeComm(PrevNotTail(0x00507299), "SHA-224 [Init]\nSHA-224 init constants (also used in SHA-384)"

;
	MarkPosition(0x00555FA8, 0, 0, 0, slotidx + 62, "SHA-256 [mixing]"

;
	MakeComm(PrevNotTail(0x00555FA9), "SHA-256 [mixing]\nSHA-256 mixing constants (also used in SHA-512)"

;
	MarkPosition(0x00509258, 0, 0, 0, slotidx + 63, "SHA-384 [Init]"

;
	MakeComm(PrevNotTail(0x00509259), "SHA-384 [Init]\nSHA-384 init constants (partly used also in SHA-224)"

;
	MarkPosition(0x005092F8, 0, 0, 0, slotidx + 64, "SHA-512 [init]"

;
	MakeComm(PrevNotTail(0x005092F9), "SHA-512 [init]\nSHA-512 init constants (partly used also in SHA-256)"

;
	MarkPosition(0x0054EC44, 0, 0, 0, slotidx + 65, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054EC45), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 184 bits"

;
	MarkPosition(0x0054ED2C, 0, 0, 0, slotidx + 66, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054ED2D), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 154 bits"

;
	MarkPosition(0x0054EDD8, 0, 0, 0, slotidx + 67, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054EDD9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 112 bits"

;
	MarkPosition(0x0054EDF8, 0, 0, 0, slotidx + 68, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054EDF9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 113 bits"

;
	MarkPosition(0x0054EEB0, 0, 0, 0, slotidx + 69, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054EEB1), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 430 bits"

;
	MarkPosition(0x0054F168, 0, 0, 0, slotidx + 70, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F169), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 367 bits"

;
	MarkPosition(0x0054F3D0, 0, 0, 0, slotidx + 71, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F3D1), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 359 bits"

;
	MarkPosition(0x0054F5D8, 0, 0, 0, slotidx + 72, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F5D9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 289 bits"

;
	MarkPosition(0x0054F628, 0, 0, 0, slotidx + 73, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F629), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 304 bits"

;
	MarkPosition(0x0054F678, 0, 0, 0, slotidx + 74, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F679), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 301 bits"

;
	MarkPosition(0x0054F6C8, 0, 0, 0, slotidx + 75, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F6C9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 304 bits"

;
	MarkPosition(0x0054F718, 0, 0, 0, slotidx + 76, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F719), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 304 bits"

;
	MarkPosition(0x0054F828, 0, 0, 0, slotidx + 77, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F829), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 269 bits"

;
	MarkPosition(0x0054F9D0, 0, 0, 0, slotidx + 78, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054F9D1), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 238 bits"

;
	MarkPosition(0x0054FB10, 0, 0, 0, slotidx + 79, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054FB11), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 239 bits"

;
	MarkPosition(0x0054FC78, 0, 0, 0, slotidx + 80, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054FC79), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 239 bits"

;
	MarkPosition(0x0054FE18, 0, 0, 0, slotidx + 81, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054FE19), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 204 bits"

;
	MarkPosition(0x0054FF64, 0, 0, 0, slotidx + 82, "{Big number}"

;
	MakeComm(PrevNotTail(0x0054FF65), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 191 bits"

;
	MarkPosition(0x00550068, 0, 0, 0, slotidx + 83, "{Big number}"

;
	MakeComm(PrevNotTail(0x00550069), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 189 bits"

;
	MarkPosition(0x00550194, 0, 0, 0, slotidx + 84, "{Big number}"

;
	MakeComm(PrevNotTail(0x00550195), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 191 bits"

;
	MarkPosition(0x005502C0, 0, 0, 0, slotidx + 85, "{Big number}"

;
	MakeComm(PrevNotTail(0x005502C1), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 161 bits"

;
	MarkPosition(0x005502F0, 0, 0, 0, slotidx + 86, "{Big number}"

;
	MakeComm(PrevNotTail(0x005502F1), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 175 bits"

;
	MarkPosition(0x00550320, 0, 0, 0, slotidx + 87, "{Big number}"

;
	MakeComm(PrevNotTail(0x00550321), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 176 bits"

;
	MarkPosition(0x00550350, 0, 0, 0, slotidx + 88, "{Big number}"

;
	MakeComm(PrevNotTail(0x00550351), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 175 bits"

;
	MarkPosition(0x00550380, 0, 0, 0, slotidx + 89, "{Big number}"

;
	MakeComm(PrevNotTail(0x00550381), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 176 bits"

;
	MarkPosition(0x0055040C, 0, 0, 0, slotidx + 90, "{Big number}"

;
	MakeComm(PrevNotTail(0x0055040D), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 163 bits"

;
	MarkPosition(0x005504E8, 0, 0, 0, slotidx + 91, "{Big number}"

;
	MakeComm(PrevNotTail(0x005504E9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 163 bits"

;
	MarkPosition(0x005505EC, 0, 0, 0, slotidx + 92, "{Big number}"

;
	MakeComm(PrevNotTail(0x005505ED), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 161 bits"

;
	MarkPosition(0x00551FC8, 0, 0, 0, slotidx + 93, "{Big number}"

;
	MakeComm(PrevNotTail(0x00551FC9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 161 bits"

;
	MarkPosition(0x00552C54, 0, 0, 0, slotidx + 94, "{Big number}"

;
	MakeComm(PrevNotTail(0x00552C55), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 237 bits"

;
	MarkPosition(0x00552D54, 0, 0, 0, slotidx + 95, "{Big number}"

;
	MakeComm(PrevNotTail(0x00552D55), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 239 bits"

;
	MarkPosition(0x00552E7C, 0, 0, 0, slotidx + 96, "{Big number}"

;
	MakeComm(PrevNotTail(0x00552E7D), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 239 bits"

;
	MarkPosition(0x00552FF0, 0, 0, 0, slotidx + 97, "{Big number}"

;
	MakeComm(PrevNotTail(0x00552FF1), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 190 bits"

;
	MarkPosition(0x005530B4, 0, 0, 0, slotidx + 98, "{Big number}"

;
	MakeComm(PrevNotTail(0x005530B5), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 192 bits"

;
	MarkPosition(0x005530E8, 0, 0, 0, slotidx + 99, "{Big number}"

;
	MakeComm(PrevNotTail(0x005530E9), "{Big number}\nPossible big number constant - it may indicate various asymmetric crypto: hexadecimal, 191 bits"

;
}
I hope this means more to you than it does me....
Sadsack