Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
DL : 0
Cryptography : you have to add three strings
Update : 2024-05-18 Size : 1024 Publisher : jaydeep

DL : 0
Crypto graphy matlab coding
Update : 2024-05-18 Size : 1024 Publisher : subu

DL : 0
用DES算法的cbc模式加密图片,密码学课程实验-DES cbc mode with encryption algorithms pictures, cryptography course experiment
Update : 2024-05-18 Size : 216064 Publisher : libo

DL : 0
DES加密算法的完整性分析程序,密码学实验-DES encryption algorithm the integrity of the analytical procedures, cryptography experiments
Update : 2024-05-18 Size : 157696 Publisher : libo

DL : 0
DES加密算法的雪崩性质分析,密码学实验-Avalanche nature of DES encryption algorithm analysis, cryptography experiments
Update : 2024-05-18 Size : 157696 Publisher : libo

DL : 0
RSA公钥加密算法的C语言实现,密码学实验-RSA encryption algorithm of the C language, cryptography experiments
Update : 2024-05-18 Size : 113664 Publisher : libo

SCMUES
DL : 0
Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.
Update : 2024-05-18 Size : 968704 Publisher : Divya

大规模科学计算及其源码,适用于数论、密码学等领域研究。-Large-scale scientific computation and its source code, for number theory, cryptography and other areas of research.
Update : 2024-05-18 Size : 1654784 Publisher : Bach

Otherchap1
DL : 0
chapter 1 in book Applied Cryptography
Update : 2024-05-18 Size : 304128 Publisher : inez

DL : 0
在一些应用中,特别是现在的密码学中,常常需要用超过100位的整数来做乘法,以此来对数据加密。现在有两个小于等于100位的大整数a和b(位数相同),请写程序计算出这两个大整数乘积的结果。-In some applications, in particular, cryptography is now often need to do more than 100 integer multiplication as a way to encrypt the data. There are two less than or equal 100 large integers a and b (median same), please write a program to calculate the product of two large integer results.
Update : 2024-05-18 Size : 4096 Publisher : 胡鹏

When working with the Omnikey 5321, i couldn t find a C# library for this reader. The reader can be called via the Windows SmartCard API, Additional commands can be send with the Omnikey API. In this pack, i ve included the Omnikey syncronous API with documentation. The part i wrote myself, is the C# wrapper. I m still working on it, but the main methods are working. I also wrote an application to test the library, this application is also included.-When working with the Omnikey 5321, i couldn t find a C# library for this reader. The reader can be called via the Windows SmartCard API, Additional commands can be send with the Omnikey API. In this pack, i ve included the Omnikey syncronous API with documentation. The part i wrote myself, is the C# wrapper. I m still working on it, but the main methods are working. I also wrote an application to test the library, this application is also included.
Update : 2024-05-18 Size : 3803136 Publisher : mastermattie

开源椭圆曲线加密算法库。0.12.1最新版-Libecc is an Elliptic Curve Cryptography C++ library for fixedsize keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source libraryproviding the means to generate safe elliptic curves.
Update : 2024-05-18 Size : 2343936 Publisher : lance

DL : 0
随着计算机和通信技术的飞速发展,密码学已经渗透到了政治、经济、文化乃至个人隐私等领域,使用加密技术来保护信息的安全变得越来越重要。这篇 论文 的重点在于通过对加密算法的学习来对它们进行比较,并将它们运用到实践中。-With the computer and communications technology, the rapid development of cryptography has penetrated into the political, economic, cultural and other fields as well as privacy, use encryption to protect information security becomes increasingly important. This paper focuses on learning through the encryption algorithm to compare them, and them into practice.
Update : 2024-05-18 Size : 2048 Publisher : ding

DL : 0
this the book about cryptography.it is useful to all PG students.-this is the book about cryptography.it is useful to all PG students.
Update : 2024-05-18 Size : 26533888 Publisher : saranya

it is about cryptography.the subject is really interesting.
Update : 2024-05-18 Size : 13201408 Publisher : saranya

Otherfse
DL : 0
哈工大信息安全实验二,密码学应用与实践。实现不完美但是可以用。-Experiment II HIT information security, cryptography, application and practice. Implementation is not perfect but you can use.
Update : 2024-05-18 Size : 47104 Publisher : wangshuai

DL : 0
古典密码体制的加密和解密,包括移位密码和置换密码-Classical cryptography encryption and decryption, including the displacement and replacement password password
Update : 2024-05-18 Size : 833536 Publisher : chenggeng

DL : 0
In cryptography, SHA-1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm.
Update : 2024-05-18 Size : 11264 Publisher : Santine

DL : 0
DES算法为密码体制中的对称密码体制,又被成为美国数据加密标准,是1972年美国IBM公司研制的对称密码体制加密算法。其密钥长度为56位,明文按64位进行分组,将分组后的明文组和56位的密钥按位替代或交换的方法形成密文组的加密方法。 -DES algorithm in symmetric key cryptography system, also known as the United States Data Encryption Standard, was developed in 1972, the United States, IBM' s symmetric cipher encryption algorithm. The key length is 56 bits, 64 bits are grouped according plain text, plaintext after the packet and 56-bit bit key by the formation of alternative methods or exchange the encryption cipher group.
Update : 2024-05-18 Size : 4096 Publisher : Laura

Java Cryptography - O Reilly
Update : 2024-05-18 Size : 1393664 Publisher : fati
« 1 2 ... 43 44 45 46 47 4849 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.