Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
Update : 2024-05-04 Size : 1024 Publisher : xiaotiantian

AES加密算法的matlab实现,是密码学的又一重要加密算法-AES encryption algorithm matlab implementation is another important cryptography encryption algorithm
Update : 2024-05-04 Size : 1024 Publisher : xiaotiantian

solovay-strassen素性测试法的matlab实现,这也是密码学中的常见算法-solovay-strassen primality test of matlab implementation, which is common cryptography algorithms
Update : 2024-05-04 Size : 1024 Publisher : xiaotiantian

DL : 0
用C++BUILDER实现椭圆曲线加密源代码-Using C BUILDER implementation of elliptic curve cryptography source code
Update : 2024-05-04 Size : 212992 Publisher : jay

DL : 0
lots Elliptic curve cryptography codes. Use Visual c++ to compile
Update : 2024-05-04 Size : 1028096 Publisher : elemlele

DL : 0
1、DES加密示例程序,包含全部加密过程,可以实现单个文件加解密功能;2、椭圆曲线密码体制加密算法实现原理源码;3、RSA算法示例源码-1, DES encryption sample procedures, contains all the encryption process, you can achieve a single file encryption and decryption functions 2, Elliptic Curve Cryptography encryption algorithm implementation principle source 3, RSA algorithm sample source
Update : 2024-05-04 Size : 8192 Publisher :

DL : 0
Its about cryptography example. useful for chatting with some sort of security
Update : 2024-05-04 Size : 54272 Publisher : Siddhu

ECC 是下一代用于移动或无线环境的公钥加密技术。ECC 基于一套用于执行非对称加密的密钥生成、加密和解密算法。 ECC 包含以下重要功能: 较之传统的密码系统(如 RSA),ECC 可以使用较小的密钥大小提供同等的安全性,这可以加速计算、降低功耗和内存并节省带宽。 ECC 在椭圆曲线上进行运算。您必须选择曲线和密钥长度。曲线由 NIST、ANSI 和 SECG 等多个组织标准化并命名。由于这些标准包含密钥长度,因此您只需选择其中一个预定义的曲线名称。Web Server 7.0 支持当前指定的所有曲线。 -Elliptic Curve Diffie Hellman Cryptography
Update : 2024-05-04 Size : 46080 Publisher : 苏长风

本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。第四版与第三版相比,新增了Whirlpool、CMAC、 DDoS以及CCITSE等内容,并对简化的AES、PKI等内容做了扩充。此外,对于基本内容的讲述方法也有许多变化和更新,并新加了100多道习题。  这本教材继荣膺了1999年计算机科学与工程教材TAA奖之后,在本版中又进行了大幅度的更新以反映最新的领域发展趋势,重新组织内容以提供更优的课堂指导和自学顺序。 -In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
Update : 2024-05-04 Size : 12995584 Publisher : 秦中元

the AVR assembly cryptography code . this is usefull for any cipherman to work with algorithm and enjoy it.-the AVR assembly cryptography code . this is usefull for any cipherman to work with algorithm and enjoy it.
Update : 2024-05-04 Size : 317440 Publisher : amir

DL : 0
Elliptic Curve Cryptography full working C code for encryption and decryprion.
Update : 2024-05-04 Size : 47104 Publisher : serhat

applied cryptography ebook by bruce scheneier
Update : 2024-05-04 Size : 3488768 Publisher : sonam

这是一个windows环境下实现基于身份的PKI系统源码,由stanford大学开发。采用了椭圆曲线密码公钥系统和配对椭圆曲线计算(Tate Pairing),具有非常高的效率. -This is a windows environment to achieve identity-based PKI system source code, developed by the University of stanford. Use of Elliptic Curve Cryptography public key pair system and the elliptic curve calculation (Tate Pairing), with very high efficiency.
Update : 2024-05-04 Size : 563200 Publisher : alan

Othertest
DL : 0
古典密码学若干算法 (1) 实现移位密码; (2) 实现替换密码; (3) 实现Vigenere密码(选做); (4) 实现置换密码(换位密码); (5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。 -A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password (3) the realization of Vigenere Password (elected to do) (4) the achievement of replacement password (password transposition) (5) of each passwords, encryption string and the preparation of the two algorithms to encrypt files and carry out such experiments.
Update : 2024-05-04 Size : 31744 Publisher : 何何

《密码学与网络安全》 第四版 的习题解答,英文版-Cryptography and Network Security to answer the fourth edition of the exercise
Update : 2024-05-04 Size : 838656 Publisher : ucvvf

DL : 0
计算机网络安全与密码编码学书籍。(英文版)-Computer network security and encryption school books. (English version)
Update : 2024-05-04 Size : 240640 Publisher : huangyan

this a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Naor, Adi Shamir. -this is a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Naor, Adi Shamir.
Update : 2024-05-04 Size : 3072 Publisher : galicianpeople

DL : 0
1、实现集中式对称密钥的分配工作(作为通讯的双方A和B,都已经分别和KDC拥有会话密钥); 2、分布式对称密钥分配(作为通讯的双方A和B已经共享一个会话主密钥); 3、公钥密码技术实现对称密码技术密钥的分配(作为通讯的双方A和B已经拥有对方的公钥);-1, the realization of a centralized allocation of symmetric key (for communication between the parties A and B, respectively, and the KDC already has a session key) 2, Distributed symmetric key distribution (as communications between the parties A and B have to share a session master key) 3, public key cryptographic techniques to achieve symmetric cryptography key distribution (for communication between the parties A and B have each other' s public key)
Update : 2024-05-04 Size : 31744 Publisher : liu

DL : 0
密码学的教程,很多精妙的算法和各种方法,很好的学习教程-Cryptography Tutorial, many sophisticated algorithms and a variety of methods, good learning tutorial
Update : 2024-05-04 Size : 184320 Publisher : 武林

密码学第三版课件,包含4大部分,传统密码学以及对称加密,公钥加密等-The third edition of courseware cryptography
Update : 2024-05-04 Size : 5446656 Publisher : Ding
« 1 2 3 4 5 67 8 9 10 11 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.