Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code)
Update : 2024-04-25 Size : 5436416 Publisher : none

Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C-Wiley- Applied Cryptography, Protocols, Algorthms, and Source Code in C
Update : 2024-04-25 Size : 4329472 Publisher : none

Java Cryptography and source code
Update : 2024-04-25 Size : 1451008 Publisher : none

一本密码学的经典教材 网上一般找不到 对做密钥的人应该有用-Cryptography a classic textbook on the Internet generally do not find the key should be useful
Update : 2024-04-25 Size : 20312064 Publisher : 周周

Modern Cryptography - Theory And Practice,现代密码学 理论与实践,英文版,毛文波-Modern Cryptography- Theory And Practice, Modern Cryptography Theory and Practice, English, MAO-wave
Update : 2024-04-25 Size : 11892736 Publisher : 周周

应用密码学电子书籍,HTML版本,非常好的密码学资料,欢迎大家下载-Applied Cryptography e-books, HTML version, very good cryptography information, please download the U.S.
Update : 2024-04-25 Size : 3284992 Publisher : Laong Ying

DL : 0
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years. -The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577 ]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
Update : 2024-04-25 Size : 2561024 Publisher : wanghui

本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Update : 2024-04-25 Size : 12995584 Publisher : 秦中元

应用密码学 大牛Bruce Schneier 所著 chm格式-Applied Cryptography Bruce Schneier Daniudi book chm format
Update : 2024-04-25 Size : 3784704 Publisher : jonathan

Cryptography and Network Security, 4th Ed.-Stallings ebook. free to download
Update : 2024-04-25 Size : 12966912 Publisher : kavitha

一篇09年很不错的关于密码学的论文,是从IEEE上下载的,内容很权威-A very good 2009 paper on cryptography and is downloaded from the IEEE, the content is authoritative
Update : 2024-04-25 Size : 1137664 Publisher : James

DL : 0
cryptography based programs
Update : 2024-04-25 Size : 649216 Publisher : krishna

DL : 0
密码学,一本密码学入门书籍,介绍密码学的基本思想-Cryptography, an introduction to cryptography books, introduces the basic ideas of cryptography
Update : 2024-04-25 Size : 318464 Publisher : Miao

This is the Assysmmetric Cryptography algorithm created using Java. This is to identfy Finger prints.One of the popular algorithm
Update : 2024-04-25 Size : 115712 Publisher : Archana Palani

Java cryptography 2001
Update : 2024-04-25 Size : 1451008 Publisher : Dan211

密码学各种加密程序算法,包括DES,AES,RSA等主要的加密算法-cryptography sourse code in C
Update : 2024-04-25 Size : 980992 Publisher : 孙磊

cryptography-2.1.3 的安装文件(cryptography-2.1.3Installation files)
Update : 2024-04-25 Size : 441344 Publisher : 天空111

Practical Cryptography Algorithms and Implementations Using C
Update : 2017-12-04 Size : 1977961 Publisher : Catherina

cryptography的源码包,有的地方不能从官网上下载,传到这里来方便一点(source package , i just want to download something from your website , it's too much trouble)
Update : 2024-04-25 Size : 420864 Publisher : so小鱼

Understanding cryptography. By Christof Paar and Jan Pelzl. Solutions for texbook
Update : 2018-05-20 Size : 274175 Publisher : wildrosi
« 12 3 4 5 6 7 8 9 10 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.