Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
应用密码课程设计;VC#2005环境;SHA-256简单功能,显示每次中间哈希结果。-Applied Cryptography course design VC# 2005 environment SHA-256 Simple function, showed intermediate hash result every time.
Update : 2024-05-18 Size : 331776 Publisher : bolide

DL : 0
东北大学软件学院信息安全专业密码学DES实验源代码-Northeastern University, Institute of information security software DES cryptography source code experiment
Update : 2024-05-18 Size : 3072 Publisher : 王二

DL : 0
人们在单一恺撒密码的基础上扩展出多表密码,称为“维吉尼亚”密码。该程序实现了古代密码学重要的一个密码算法,实现密文的正确解密。-People in a single Caesar cipher based on the expansion of a multi-table code, known as the " Virginia" password. The program achieved an important ancient cryptography cryptographic algorithms, to achieve the right to decrypt the ciphertext.
Update : 2024-05-18 Size : 292864 Publisher : vince

DL : 0
椭圆曲线密码系统是最近十几年来获得迅速发展的一类密码系统.椭圆曲线的乘法的快速实现,是密码学中的重要内容,本程序实现椭圆曲线的快速乘法。-Elliptic Curve Cryptography is the last ten years to get the rapid development of a class of cryptosystems. Rapid multiplication of elliptic curves to achieve, is an important part of cryptography, the process of rapid multiplication of Elliptic Curve.
Update : 2024-05-18 Size : 1024 Publisher : vince

DL : 0
分解大数质因子的Shor算法的提出,对RSA公钥密码体系构成了很大的威胁,本程序实现2种算法的大数因子分解。-Decomposition of large number of quality factors in Shor algorithm proposed, on the RSA public key cryptography system constitutes a great threat, the program achieved two kinds of algorithm for factoring large numbers.
Update : 2024-05-18 Size : 1024 Publisher : vince

DL : 0
分析了RSA算法的安全性在以及在实际使用过程中遇到的问题。还有在RSA算法使用到的参数的选择。在VC++工具上测试,并对测试结果进行分析总结。最后给出了用C语言编写的程序实现了该算法。-SRA public key cryptography key distribution in an asymmetric cryptosystem
Update : 2024-05-18 Size : 287744 Publisher : cqy

DL : 0
密码学中的高级加密标准(Advanced Encryption Standard,AES),又称Rijndael加密法,是美国联邦政府采用的一种区块加密标准。这个标准用来替代原先的DES,已经被多方分析且广为全世界所使用。经过五年的甄选流程,高级加密标准由美国国家标准与技术研究院 (NIST)于2001年11月26日发布于FIPS PUB 197,并在2002年5月26日成为有效的标准。2006年,高级加密标准已然成为对称密钥加密中最流行的算法之一。-Cryptography Advanced Encryption Standard (Advanced Encryption Standard, AES), also known as Rijndael encryption method, is the U.S. federal government adopted a block encryption standard. This standard is used to replace the original DES, have been multi-analysis and widely used around the world. After five years of the selection process, the Advanced Encryption Standard by the National Institute of Standards and Technology (NIST) on November 26, 2001 Posted in FIPS PUB 197, and in May 26, 2002 as an effective standard. In 2006, the Advanced Encryption Standard has become symmetric key encryption algorithm is one of the most popular.
Update : 2024-05-18 Size : 2048 Publisher : 李新

DL : 0
RSA算法的原理分析及实现。RSA是既能用于数据加密也能用于数字签名的一种非对称密码体制的算法。它有一对密钥,其中之一是私有密钥,由用户保存;另一个为公开密钥,可对外公开。并用VC++语言实现-RSA algorithm analysis and realization of the principle. RSA is the best tool for data encryption can also be used as a digital signature algorithm for asymmetric cryptography. It has a pair of keys, which is one of the private key, stored by the user the other for the public key, available to the public. With VC++ language
Update : 2024-05-18 Size : 119808 Publisher : 张浩

Otherdes
DL : 0
密码学原理与实践,涵盖多种密码学算法及其实现。对学习密码学很有帮助。-Principles and practice of cryptography, covering a variety of cryptographic algorithms and their implementation. Helpful for learning cryptography.
Update : 2024-05-18 Size : 6144 Publisher : 大陆

DL : 0
AES 加密解密算法,我的应用密码学课程实验-AES encryption and decryption algorithms, Applied Cryptography course of my experiments
Update : 2024-05-18 Size : 3072 Publisher : 曹峰

This the cryptography book-This is the cryptography book
Update : 2024-05-18 Size : 2637824 Publisher : Balakannan

DL : 0
张焕国老师的密码学PPT,绝对好东西,大家赶紧收藏。-Huan-Guo Zhang teachers cryptography PPT, definitely a good thing, we quickly collection.
Update : 2024-05-18 Size : 2182144 Publisher : 仙豆

密码学,加密相关知识介绍,很好的密码学习资料。-Introduction to Cryptography,Introduction to Cryptography
Update : 2024-05-18 Size : 10079232 Publisher : 刘水静

DL : 0
密碼學中的明文與密文的轉換,在visual studio 2008中開發而來-Cryptography conversion of plaintext and ciphertext, in visual studio 2008 to develop from
Update : 2024-05-18 Size : 1024 Publisher : 王小虎

经典密码学和现代密码学教学课件和教学资源,内容非常丰富,费了很大劲获得,请多支持-Classical cryptography and modern cryptography courseware and teaching resources, the content is very rich and with a great enthusiasm was, like him to support
Update : 2024-05-18 Size : 4755456 Publisher : 王袍

DL : 0
 It has been proved that network coding can be used to improve the throughput for multicast t ransmission , but such systems are very vulnerable to contamination at tack , and the signatures for t raditional network are no longer suitable for network coding. Network coding allows the forwarding and receiving nodes to verify the coded messages against the contamina2 tion at tacks. In this paper , we proposed a network coding signature scheme based on homomorphism public cryptography which uses the one time secrete key and it changes along with the change of the messages , so that it is infeasible for adversary to get the secrete key and forge the signature to contaminate the message
Update : 2024-05-18 Size : 94208 Publisher : sunwei

DL : 0
 It has been proved that network coding can be used to improve the throughput for multicast t ransmission , but such systems are very vulnerable to contamination at tack , and the signatures for t raditional network are no longer suitable for network coding. Network coding allows the forwarding and receiving nodes to verify the coded messages against the contamina2 tion at tacks. In this paper , we proposed a network coding signature scheme based on homomorphism public cryptography which uses the one time secrete key and it changes along with the change of the messages , so that it is infeasible for adversary to get the secrete key and forge the signature to contaminate the message
Update : 2024-05-18 Size : 984064 Publisher : sunwei

DL : 0
PHP实现RSA算法/* * Implementation of the RSA algorithm * (C) Copyright 2004 Edsko de Vries, Ireland * * Licensed under the GNU Public License (GPL) * * This implementation has been verified against [3] * (tested Java/PHP interoperability). * * References: * [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996 * [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online) * [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle, * (open source cryptography library for Java, online) * [4] "PKCS #1: RSA Encryption Standard", RSA Laboratories Technical Note, * version 1.5, revised November 1, 1993 */ -/* * Implementation of the RSA algorithm * (C) Copyright 2004 Edsko de Vries, Ireland * * Licensed under the GNU Public License (GPL) * * This implementation has been verified against [3] * (tested Java/PHP interoperability). * * References: * [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996 * [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online) * [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle, * (open source cryptography library for Java, online) * [4] "PKCS#1: RSA Encryption Standard", RSA Laboratories Technical Note, * version 1.5, revised November 1, 1993 */
Update : 2024-05-18 Size : 6144 Publisher : gg

麻省理工学院密码学讲义,对密码学习很有帮助 很有参考价值!-Massachusetts Institute of Technology cryptography lecture notes, a good reference!
Update : 2024-05-18 Size : 1479680 Publisher : 孙文海

该压缩文件是用于现代密码学中的仿射映射的程序,希望对学习现代密码学的同学有用-The compressed file is used in modern cryptography in the affine mapping procedures in the hope of learning useful to students of modern cryptography
Update : 2024-05-18 Size : 8192 Publisher : tanggang
« 1 2 ... 41 42 43 44 45 4647 48 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.