DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - cryptography
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - cryptography - List
【
Other
】
cisspallinone
DL : 0
Cryptography and network security-Cryptography and network security.....
Update
: 2024-05-04
Size
: 648192
Publisher
:
sumit
【
Crack Hack
】
Cryptography
DL : 0
Cryptography and NetworkSecurity
Update
: 2024-05-04
Size
: 36864
Publisher
:
mmsp
【
Crack Hack
】
Cryptography
DL : 0
密码学基本理论知识,为对于初学者有很大的帮助,专为初学者设计-Basic theoretical knowledge of cryptography, for the great help for beginners, for beginners
Update
: 2024-05-04
Size
: 186368
Publisher
:
亥丕
【
VHDL-FPGA-Verilog
】
Handbook_elliptic_curve_cryptography
DL : 0
A wnice to guide to stat Elliptic Curve Cryptography
Update
: 2024-05-04
Size
: 5222400
Publisher
:
kalidas
【
JSP/Java
】
0764596330
DL : 0
JAVA网络安全方面的书籍,非常有用,英文原版-David Hook- Beginning Cryptography with Java
Update
: 2024-05-04
Size
: 2560000
Publisher
:
darren
【
JSP/Java
】
final11
DL : 0
Here i am going to introduce a DNA based cryptography method....all the details are on the slide.
Update
: 2024-05-04
Size
: 718848
Publisher
:
Rajat Sen
【
Crack Hack
】
Ch1-Ch09
DL : 0
Cryptography And Network Security 4th Edition 05
Update
: 2024-05-04
Size
: 2197504
Publisher
:
eman
【
Crack Hack
】
Computer-cryptography
DL : 0
计算机密码学及其应用,对密码学感兴趣的朋友们可以看看。-Computer cryptography and its applications, cryptography interested friends can see.
Update
: 2024-05-04
Size
: 6447104
Publisher
:
醉舞明月
【
Special Effects
】
Step-Construction-of-Visual-Cryptography-Schemes.
DL : 0
Two common drawbacks of the visual cryptography scheme (VCS) are the large pixel expansion of each share image and the small contrast of the recovered secret image. In this paper, we propose a step construction to construct VCS and VCS for general access structure by applying (2,2)-VCS recursively, where a participant may receive multiple share images. The proposed step construction generates VCS and VCS which have optimal pixel expansion and contrast for each qualified set in the general access structure in most cases. Our scheme applies a technique to simplify the access structure, which can reduce the average pixel expansion (APE)
Update
: 2024-05-04
Size
: 391168
Publisher
:
isclor
【
Crack Hack
】
Cryptography-course-design
DL : 0
密码学课程设计,des加密算法,rsa加密算法-Cryptography course design, des encryption algorithm, rsa encryption algorithm
Update
: 2024-05-04
Size
: 955392
Publisher
:
王涛
【
Other
】
an-introduction-to-cryptography
DL : 0
a book for cryptography
Update
: 2024-05-04
Size
: 590848
Publisher
:
Mokotay
【
CA auth
】
cryptography
DL : 0
Richard Spillman著,第一部分介绍了密码学的经典问题,第二部分介绍了现代密码学,包括流加密法,块加密法和公共密钥加密法,第三部分介绍了密码学的未来,并对量子加密法进行了简单介绍 -Richard Spillman zhao, the first part introduces the classic question of cryptography, the second part presents a modern cryptography, including flow encryption, blocks encryption method and the public key encryption method is introduced, the third part of cryptography to future and quantum encryption method is simply introduced
Update
: 2024-05-04
Size
: 61455360
Publisher
:
flymydream
【
Crack Hack
】
Applied-Cryptography-answer
DL : 0
应用密码学答案,电子工业出版社胡向东编著-Applied Cryptography answer, Electronic Industry Press Xiang-Dong Hu ed
Update
: 2024-05-04
Size
: 192512
Publisher
:
陈江
【
Other
】
Cryptography-And-Network-Security-4th-Edition-200
DL : 0
Guideline to use cryptograply and network sercurity
Update
: 2024-05-04
Size
: 12995584
Publisher
:
maiducphu
【
SCM
】
Cryptography-Theory_and_practice_3ed
DL : 0
Cryptography-Theory_and_practice_3ed code
Update
: 2024-05-04
Size
: 3010560
Publisher
:
shch
【
Other
】
An-introduction-to-cryptography
DL : 0
密码学入门知识,适合编写安全程序的人学习-An introduction to cryptography
Update
: 2024-05-04
Size
: 12288
Publisher
:
苏颖
【
Crack Hack
】
Understanding-Cryptography
DL : 0
Understanding Cryptography
Update
: 2024-05-04
Size
: 3682304
Publisher
:
Anton G
【
CA auth
】
Handbook-of-Applied-Cryptography
DL : 0
Handbook of applied cryptography
Update
: 2024-05-04
Size
: 5579776
Publisher
:
valentingulimanescu
【
Software Engineering
】
Users-Guide-To-Cryptography-And-Standards
DL : 0
User s Guide To Cryptography And Standards
Update
: 2024-05-04
Size
: 1920000
Publisher
:
dex
【
Crack Hack
】
Modern-cryptography-
DL : 0
1、Vigenere的编程实现 使用C语言设计实现古典密码体制中的Vigenere密码,并加/解密一个文件 2、Column permutation 密码的编程实现 编程(建议使用C语言)实现古典密码体制中的Column permutation密码,并加/解密一个字符串或文件 3、DES的编程实现 使用C语言设计实现DES密码,并加/解密一个文件 -1, Vigenere of programming using C language design and implementation of the Vigenere classical cryptosystem password and encrypt/decrypt a file 2, Column permutation password programming programming (recommended C language) to achieve classical cryptography in Column permutation password and encrypt/decrypt a string or file 3, DES of programming language design and implementation using C DES cipher, and encrypt/decrypt a file
Update
: 2024-05-04
Size
: 6144
Publisher
:
萧瑜
«
1
2
...
5
6
7
8
9
10
11
12
13
14
15
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.