Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
DL : 0
密码学与网络安全技术基础,汤惟主编,做这方面的人可以参考一下-Cryptography and network security technology , edited by TangWei, so you can refer to that
Update : 2024-05-04 Size : 6750208 Publisher : 高蕾

计算机密码学及其应用带你解读深奥的密码世界-Computer cryptography and its application
Update : 2024-05-04 Size : 3793920 Publisher : 高洋

DL : 0
JAVA网络安全编程资料,有各类案例分析-JAVA CRYPTOGRAPHY
Update : 2024-05-04 Size : 1393664 Publisher : darren

加密算法System.Security.Cryptography命名空间的DES算法加密算法-加密算法System.Security.Cryptography命名空间的DES算法加密算法System.Security.Cryptography命名空间的DES算法
Update : 2024-05-04 Size : 75776 Publisher : liuguofeng

DL : 0
密码学里的单表置换法的一个实际应用,可用来排考场座位号。-Cryptography in the single table a practical application of replacement method can be used to schedule exam seat number.
Update : 2024-05-04 Size : 1024 Publisher : 张立

Beginning Cryptography With Java
Update : 2024-05-04 Size : 2560000 Publisher : landry

DL : 0
密码学的基本算法代码 MD4 线性移位器 仿射加密 数字签名-The basic algorithm of cryptography code MD4, linear displacement device affine encrypt digital signature
Update : 2024-05-04 Size : 3560448 Publisher : kom

VC/MFCRSA
DL : 0
RSA非对称密码的VC++实现,非常好用-RSA asymmetric cryptography in the VC++ to achieve and very easy to use
Update : 2024-05-04 Size : 3322880 Publisher : ysshr

DL : 0
对称密码算法,des算法加解密软件,可实现对文件的加解密-cryptography algorithm
Update : 2024-05-04 Size : 4126720 Publisher : zhang

DL : 0
对密码学的课程设计有好处是AES的实现过程-Curriculum design of good cryptography is the realization process of AES
Update : 2024-05-04 Size : 14336 Publisher : shuilan

SCMAES_cs
DL : 0
In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael.
Update : 2024-05-04 Size : 136192 Publisher : monica1987is

In cryptography, client - server application with bank, client and lottery.
Update : 2024-05-04 Size : 335872 Publisher : monica1987is

DL : 0
In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. SHA-2 includes a significant number of changes from its predecessor, SHA-1. SHA-2 consists of a set of four hash functions with digests that are 224, 256, 384 or 512 bits.
Update : 2024-05-04 Size : 4096 Publisher : monica1987is

DL : 0
当我们有时候需要一个加密过的字符串的时候,当我们懒得写一行php代码求字符串的md5值的时候,这是一个很好的工具.程序很简单.调用 System.Security.Cryptography,使用其中的MD5类来加密字符串.将计算结果再显示在另外一个TextBox中. -When we sometimes need an encrypted string, when we bother to write a line of php code to find the md5 value of the string when it is a good tool. Program is very simple. Call System.Security.Cryptography, use class to which the MD5 encrypted string. will then display the results in another TextBox.
Update : 2024-05-04 Size : 329728 Publisher : boshen

DL : 0
数论与密码学的相关内容,适合对数学在密码的应用感兴趣者使用。-Number theory and cryptography-related content, suitable for the application of mathematics are interested in the password to use.
Update : 2024-05-04 Size : 372736 Publisher : 彭顺

DL : 0
ASE算法实现 C++ MFC 密码学课程设计-ASE algorithm C++ MFC Cryptography Course Design
Update : 2024-05-04 Size : 1954816 Publisher : lilinxuan

DL : 0
计一个vigenere密码类,类的对象各自拥有不用的密匙。用不用对象加密相同的明文,将会获得不同的密文。加密过程如下:设密匙为K=k1k2.......kn,明文为M=m1m2.......mn,密文为C=c1c2.......cn,其中k1k2.........kn,m1m2...........mn, c1c2.........cn,每个都代表一个字母。 将字母A到Z编号,从0到25,那么它们之间有这样的对应关系:ci=(mi+ki)mod26。 例如,M=data security,K=best,那么首先将M分解成长为4的序列:data secu rity 每一节都使用密匙K=best进行加密,得到序列:EELT TIUN SMLR 将明文的空格添加进去,就得到密文:EELT TIUNSMLR出于密码体制的需要,密文中的字母全部使用大写字母。-Account for one vigenere password class, class of objects do not have the keys of their respective owners. No object with the same plaintext encrypted, the ciphertext will be different. Encryption process is as follows: Let key as K = k1k2 ....... kn, expressly for the M = m1m2 ....... mn, the ciphertext is C = c1c2 ....... cn, where k1k2 ......... kn, m1m2 ........... mn, c1c2 ......... cn, each of which represents a letter. The letters A to Z number, from 0 to 25, then they have such a corresponding relationship between the: ci = (mi+ ki) mod26. For example, M = data security, K = best, then the first M sequence of decomposition of the growth of 4: data secu rity each section using the encryption key K = best, be sequences: EELT TIUN SMLR add the plaintext space go to get the ciphertext: EELT TIUNSMLR the need for cryptography, ciphertext letter in all uppercase letters.
Update : 2024-05-04 Size : 2048 Publisher : 小杨

DL : 0
VB Cryptography method
Update : 2024-05-04 Size : 2048 Publisher : Ricardo

DL : 0
Another VB Cryptography method
Update : 2024-05-04 Size : 2048 Publisher : Ricardo

openssl为网络通信提供安全及数据完整性的一种安全协议,囊括了主要的密码算法、常用的密钥和证书封装管理功能以及SSL协议,并提供了丰富的应用程序供测试或其它目的使用。 -The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation
Update : 2024-05-04 Size : 658432 Publisher : wendy
« 1 2 ... 45 46 47 48 49 50»
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.