DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - cryptography
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - cryptography - List
【
JSP
】
[EBOOK---EN]-OReilly---Java-Cryptography
DL : 0
[EBOOK - EN] O Reilly - Java Cryptography
Update
: 2024-05-18
Size
: 1393664
Publisher
:
Andrew Qz
【
Other
】
Applied-Cryptography
DL : 0
应用密码学:协议、算法与C源程序: 世界上有两种密码,一种是防止你的小妹妹偷看你的文件;另一种是防止当局阅读你的文件资料。本书讲的是后一种。-Applied Cryptography: Protocols, Algorithms and C source code: The world has two kinds of passwords, one is to prevent your little sister peek at your file Another is to prevent the authorities from reading your documents. Book is about the latter.
Update
: 2024-05-18
Size
: 20366336
Publisher
:
gece
【
Crack Hack
】
Applied-Cryptography-C-source-code
DL : 0
《应用密码学:协议、算法与C源程序》一书的附带c语言源码-"Applied Cryptography: Protocols, Algorithms and C source code," a book with c language source code.
Update
: 2024-05-18
Size
: 5822464
Publisher
:
gece
【
Crack Hack
】
Symmetric-key-cryptography
DL : 1
完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Update
: 2024-05-18
Size
: 45056
Publisher
:
丁元元
【
source in ebook
】
Cryptography
DL : 0
很好的一本密码学书籍,介绍了几种常用的加密方法-A good book on introduction to cryptography, introduces the commonly used method to realize several encryption algorithms
Update
: 2024-05-18
Size
: 6616064
Publisher
:
丁少玲
【
Program doc
】
Parameter-evaluation-of-various-cryptography-tech
DL : 0
In this document cryptography is discussed. some information in being sent in form of codes known as encryption and at the receiver side decryption is done to recover the information.
Update
: 2024-05-18
Size
: 1009664
Publisher
:
roopali
【
Other
】
Cryptography-and-Network-Security
DL : 0
Cryptography and Network Security fifth edition 密码学与网络安全 第五版-Cryptography and Network Security fifth edition
Update
: 2024-05-18
Size
: 6989824
Publisher
:
lj
【
Software Engineering
】
Visual-Cryptography
DL : 0
visual cryptography short tutorial. visual cryptography is used for secured transmission of message over a network.
Update
: 2024-05-18
Size
: 108544
Publisher
:
rahul
【
Other
】
Applied-Cryptography
DL : 0
Applied Cryptography book
Update
: 2024-05-18
Size
: 2580480
Publisher
:
yadi
【
Crack Hack
】
NET-Cryptography
DL : 0
.net密码术 其中包括了对称加密、非对称加密、数字签名、散列算法等。-. Net cryptography including symmetric encryption, asymmetric encryption, digital signatures, hashing algorithm.
Update
: 2024-05-18
Size
: 71680
Publisher
:
杜杜
【
Other
】
Applied-Cryptography
DL : 0
应用密码学:协议、算法与C源程序,中文版,作者以幽默的语言讲解了应用密码,文中有C源程序。-Applied Cryptography: Protocols, Algorithms and C source code, the Chinese version, the author humorous language to explain the application code, the text has C source code.
Update
: 2024-05-18
Size
: 20369408
Publisher
:
朱义杰
【
Other
】
Military-cryptography
DL : 0
这是一本介绍战争中的数学-军事密码学的书籍。介绍了经典的加密解码算法及其在战争中的应用。-his is an introduction to the war of mathematics- the books of the military cryptography. Introduces the classical encryption decryption algorithm and its application in the war.
Update
: 2024-05-18
Size
: 6915072
Publisher
:
张一
【
Other
】
Applied-Cryptography-2nd-ed.----B.-Schneier
DL : 0
a awesome book on cryptography
Update
: 2024-05-18
Size
: 3084288
Publisher
:
liku169
【
Other
】
Computer-cryptography.PDF.tar
DL : 0
密码学基础书籍,信息安全必备读物,主要研究算法,不涉及语言问题-Cryptography based on books, information security essential reading, the main research method that does not involve language problems
Update
: 2024-05-18
Size
: 23436288
Publisher
:
liujz
【
Other
】
Combination-of-cryptography.pdf.tar
DL : 0
组合学方法研究编码解码理论,密码学的一大延伸-Combinatorics studied codec theory, cryptography is a major extension
Update
: 2024-05-18
Size
: 3635200
Publisher
:
liujz
【
Other
】
Applied-Cryptography-2nd-ed---B
DL : 0
应用密码学, 包含基本的密码算法, 如DES, BLOWFISH,。。。等-Applied Cryptography
Update
: 2024-05-18
Size
: 3086336
Publisher
:
bing hu
【
Crack Hack
】
Color-Extended-Visual-Cryptography-Using-Error-Di
DL : 0
Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Update
: 2024-05-18
Size
: 23552
Publisher
:
shital
【
Crack Hack
】
Applied-Cryptography---Bruce-Schneier
DL : 0
Applied Cryptography, Second Edition Protocols, Algorthms, and Source Code in C - Bruce Schneier
Update
: 2024-05-18
Size
: 3794944
Publisher
:
Leganola Aston
【
Software Engineering
】
cryptography
DL : 0
builder/ hesh/ cryptography/
Update
: 2024-05-18
Size
: 41984
Publisher
:
Hanna18
【
Other
】
A-Classical-Introduction-to-Cryptography-Exercise
DL : 0
A Classical Introduction to Cryptography Exercise Book
Update
: 2024-05-18
Size
: 8359936
Publisher
:
akiaki
«
1
2
...
8
9
10
11
12
13
14
15
16
17
18
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.