Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
DL : 0
eliptic curve cryptography decryption
Update : 2024-05-05 Size : 37888 Publisher : senthamaraikannan

DL : 0
Cryptography algorithm
Update : 2024-05-05 Size : 65536 Publisher : SK Sarangi

Altera公司高端FPGA高级综合指导手册,包括:算术运算单元,浮点处理技巧,数据编码格式转换,视频处理,仲裁逻辑,多路选择,存储逻辑,计数器,通信逻辑,循环冗余校验,随机和伪随机函数,加密和同步等编码风格和技巧;-advanced synthesis cookbook for Altera high-end FPGA(Stratix),incuding coding style and design tricks for arithmetic,floating points operation,tranlation and format convertion,vidio, arbitor, multiplexing, registers and memories,communication,CRC,random and pseudorandom functions,cryptography,synchronization,etc.
Update : 2024-05-05 Size : 962560 Publisher : 刘易

DL : 0
[cryptography] AES encrypt and decrypt for j2me,
Update : 2024-05-05 Size : 3072 Publisher : SofTech

DL : 0
密码学实验平台,完整独立运行VC6.0 源程序,包含对称密码学和公钥密码学的主要算法。-Cryptography experimental platform, a complete stand-alone source of VC6.0, including the main algorithm of symmetric cryptography and public key cryptography.
Update : 2024-05-05 Size : 155648 Publisher : zhou

DL : 0
Cryptography in MATLAB
Update : 2024-05-05 Size : 737280 Publisher : Eugene

DL : 0
encryption algorithm, IDEA, symmetric key cryptography algorithm used in internet widly
Update : 2024-05-05 Size : 447488 Publisher : sujata

密码编码学宇网络安全的答案 密码编码学宇网络安全的答案-answer for Cryptography and Network Security
Update : 2024-05-05 Size : 842752 Publisher : 冯伟

一本介绍密码学现代知识的学习资料,对于密码算法编程方面很有用。-A description of the study of modern knowledge of cryptography information programming for the cryptographic algorithm is useful.
Update : 2024-05-05 Size : 4482048 Publisher : lixiaobo

New Directions in Cryptography,j介绍加密的方向,对密码学有研究的必读-New Directions in Cryptography, j describes the direction of encryption on a study of cryptography required reading for
Update : 2024-05-05 Size : 240640 Publisher : paul lew

DL : 0
使用DES解密和加密文件,供JAVA爱好者交流和学习-The use of DES decryption and encryption documents for sharing and learning JAVA lovers
Update : 2024-05-05 Size : 1024 Publisher : mu

DL : 0
poj2109:Power of Cryptography.贪心算法.正确程序.-poj2109:Power of Cryptography.Greedy algorithm.accepted program.
Update : 2024-05-05 Size : 1024 Publisher : 王文波

应用密码学:协议、算法与C源程序 全书共分四个部分,首先定义了密码学的多个术语,介绍了密码学的发展及背景,描述了密码学从简单到复杂的各种协议,详细讨论了密码技术,并在此基础上列举了如DES、IDEA、RSA、DSA等10多个算法以及多个应用实例,并提供了算法的源代代码清单。 全书内容广博权威,具有极大的实用价值。自出版以来,得到业内专家的高度赞誉,是致力于密码学研究的专业及非专业人员一本难得的好书。-Applied Cryptography: Protocols, Algorithms and C source code book is divided into four parts, first of all define the various terms of cryptography, introduced the development of cryptography and background, describes cryptography from the simple to the complex variety of agreements, cryptographic techniques are discussed in detail, and on this basis, lists, such as DES, IDEA, RSA, DSA algorithm, as well as more than 10 instances of multiple applications and provides the algorithm' s source code for the list generation. Broad authority of the contents of the book has great practical value. Since the publication has received high praise from industry experts, is dedicated to the study of cryptography professional and non-professionals, a rare books.
Update : 2024-05-05 Size : 20429824 Publisher : cheng

DL : 0
最近在学密码学,这一个实现playfair加密算法的java类,主要包括构造函数、加密函数和解密函数,还有几个辅助函数,附有测试类,在控制台下运行的。-A recent study of cryptography, which playfair encryption algorithm to achieve a java class, mainly including constructor, encryption and decryption function, a function, and several auxiliary functions, with a test class, running under the console.
Update : 2024-05-05 Size : 6144 Publisher : 老棉

Galois field is used in ECC( elliptic curve cryptography). This is a brief introdustion about the prime field and its related concepts
Update : 2024-05-05 Size : 224256 Publisher : mma32

DL : 0
Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the nodes can be deployed. Protocols are also necessary to ensure synchronization of keys between the devices on a network. These protocols require significant communication and storage overhead. The limitation of such a cryptosystem is that it is not possible to guarantee the confidentiality of the session keys
Update : 2024-05-05 Size : 179200 Publisher : yared

In this IEEE Paper "Visual Cryptography is Solved" in c and MATLAB-In this IEEE Paper "Visual Cryptography is Solved" in c and MATLAB
Update : 2024-05-05 Size : 878592 Publisher : malli

Introduction to cryptology. This presentation provides and overview of cryptography and how it fits within the framework of network security.
Update : 2024-05-05 Size : 449536 Publisher : athar

DL : 0
字母频率统计:包括1维与二维字母出现频率与总数-Letter frequency statistics include: 1-dimensional and two-dimensional frequency and the total number of letters
Update : 2024-05-05 Size : 2048 Publisher : luoluo

DL : 0
关于密码学方面的经典著作,绝对有很强的指导意义,适合各类人士学习-With regard to cryptography aspects of classic, we do have a very strong guide, suitable for all kinds of people to learn
Update : 2024-05-05 Size : 12054528 Publisher : connotation
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.