Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
[EBOOK - EN] O Reilly - Java Cryptography
Update : 2024-05-18 Size : 1393664 Publisher : Andrew Qz

应用密码学:协议、算法与C源程序: 世界上有两种密码,一种是防止你的小妹妹偷看你的文件;另一种是防止当局阅读你的文件资料。本书讲的是后一种。-Applied Cryptography: Protocols, Algorithms and C source code: The world has two kinds of passwords, one is to prevent your little sister peek at your file Another is to prevent the authorities from reading your documents. Book is about the latter.
Update : 2024-05-18 Size : 20366336 Publisher : gece

《应用密码学:协议、算法与C源程序》一书的附带c语言源码-"Applied Cryptography: Protocols, Algorithms and C source code," a book with c language source code.
Update : 2024-05-18 Size : 5822464 Publisher : gece

完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Update : 2024-05-18 Size : 45056 Publisher : 丁元元

很好的一本密码学书籍,介绍了几种常用的加密方法-A good book on introduction to cryptography, introduces the commonly used method to realize several encryption algorithms
Update : 2024-05-18 Size : 6616064 Publisher : 丁少玲

In this document cryptography is discussed. some information in being sent in form of codes known as encryption and at the receiver side decryption is done to recover the information.
Update : 2024-05-18 Size : 1009664 Publisher : roopali

Cryptography and Network Security fifth edition 密码学与网络安全 第五版-Cryptography and Network Security fifth edition
Update : 2024-05-18 Size : 6989824 Publisher : lj

visual cryptography short tutorial. visual cryptography is used for secured transmission of message over a network.
Update : 2024-05-18 Size : 108544 Publisher : rahul

Applied Cryptography book
Update : 2024-05-18 Size : 2580480 Publisher : yadi

.net密码术 其中包括了对称加密、非对称加密、数字签名、散列算法等。-. Net cryptography including symmetric encryption, asymmetric encryption, digital signatures, hashing algorithm.
Update : 2024-05-18 Size : 71680 Publisher : 杜杜

应用密码学:协议、算法与C源程序,中文版,作者以幽默的语言讲解了应用密码,文中有C源程序。-Applied Cryptography: Protocols, Algorithms and C source code, the Chinese version, the author humorous language to explain the application code, the text has C source code.
Update : 2024-05-18 Size : 20369408 Publisher : 朱义杰

这是一本介绍战争中的数学-军事密码学的书籍。介绍了经典的加密解码算法及其在战争中的应用。-his is an introduction to the war of mathematics- the books of the military cryptography. Introduces the classical encryption decryption algorithm and its application in the war.
Update : 2024-05-18 Size : 6915072 Publisher : 张一

a awesome book on cryptography
Update : 2024-05-18 Size : 3084288 Publisher : liku169

密码学基础书籍,信息安全必备读物,主要研究算法,不涉及语言问题-Cryptography based on books, information security essential reading, the main research method that does not involve language problems
Update : 2024-05-18 Size : 23436288 Publisher : liujz

组合学方法研究编码解码理论,密码学的一大延伸-Combinatorics studied codec theory, cryptography is a major extension
Update : 2024-05-18 Size : 3635200 Publisher : liujz

应用密码学, 包含基本的密码算法, 如DES, BLOWFISH,。。。等-Applied Cryptography
Update : 2024-05-18 Size : 3086336 Publisher : bing hu

Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Update : 2024-05-18 Size : 23552 Publisher : shital

Applied Cryptography, Second Edition Protocols, Algorthms, and Source Code in C - Bruce Schneier
Update : 2024-05-18 Size : 3794944 Publisher : Leganola Aston

builder/ hesh/ cryptography/
Update : 2024-05-18 Size : 41984 Publisher : Hanna18

A Classical Introduction to Cryptography Exercise Book
Update : 2024-05-18 Size : 8359936 Publisher : akiaki
« 1 2 ... 8 9 10 11 12 1314 15 16 17 18 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.