Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - cryptography
Search - cryptography - List
gnu crypto it is good library for cryptography
Update : 2024-05-04 Size : 5777408 Publisher : toto

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Update : 2024-05-04 Size : 2560000 Publisher : YY

matlabLFSR
DL : 0
A Matlab Code for producing LFSR Full Period for an specifeid initial vector in cryptography
Update : 2024-05-04 Size : 1024 Publisher : Zahra

An-Introduction-to-Cryptography-for-Non Cryptographers-With-Mathematical-Background
Update : 2024-05-04 Size : 137216 Publisher : sam

beginning cryptography with java
Update : 2024-05-04 Size : 2554880 Publisher : sam

OtherC
DL : 0
密码学算法协议C实现 自密码学从外交情报和军事领域走向公开后,密码学文献难觅的窘境已大为改观,但密码学资料的晦涩难懂却依然如故。广大研究人员和读者一直盼望能有一本介绍当代密码学现状且可读性强的著作。Bruce Schneier所著《Applied Cryptography: protoools, algorithms, and source code in C》一书正是这样一部集大成之作。本书以生动的描述和朴实的文风将当代密码学的方方面面熔于一炉,1994年第1版一经推出即在国际上引起广泛关注,成为近几年来引用最多,销量最大的密码学专著,极大地推动了国际密码学研究与应用的发展。作者顺应近年来的世界各国对信息安全普遍关注的趋势,结合了第1版问世以来密码学的新成果,于1996年推出了第2版,仍是好评如潮,本书即根据第2版译出。-Cryptographic algorithms to achieve an agreement C
Update : 2024-05-04 Size : 20312064 Publisher : xingyuan

Cryptography for developers eBook by Tom St Denis, Simon Johnson. -Special examples of Cryptography goals: Privacy, Integrity, Authentication -Full Discussion of Large Integer Arithmetic, Public Key Algoritms
Update : 2024-05-04 Size : 3670016 Publisher : Alexander

Cryptography and network security
Update : 2024-05-04 Size : 37888 Publisher : minhchau

behrouz forouzan的cryptography and network security 的课后习题答案-cryptography and network security of behrouz forouzan. answers to Exercise in after every chapter
Update : 2024-05-04 Size : 4895744 Publisher : xyh

a Elliptic Curve Cryptography Library
Update : 2024-05-04 Size : 4062208 Publisher : eduardovg88

The BasicDES Cryptography Core is a small, fast implementation of the DES-56 encryption standard.
Update : 2024-05-04 Size : 26624 Publisher : FPGACore

Applied Cryptography Second Edition,应用密码学第二版英文版-Applied Cryptography Second Edition, Applied Cryptography Second Edition English
Update : 2024-05-04 Size : 3286016 Publisher : yam

This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as storage devices, embedded systems, network routers, etc.
Update : 2024-05-04 Size : 452608 Publisher : dudeafroz

无线传感器网络上基于椭圆曲线密码的认证方案设计与实现,一篇和好的论文-Wireless sensor networks Based on Elliptic Curve Cryptography certification program design and implementation, and a good paper
Update : 2024-05-04 Size : 3182592 Publisher : mm

Handbook of Applied Cryptography - issue 1997, full ebook
Update : 2024-05-04 Size : 4630528 Publisher : bibo

matlabRSA
DL : 0
密码学中RSA算法的MATLAB实现。包含算法说明及程序验证。-Cryptography RSA algorithm MATLAB implementation. Contains the algorithm description and program verification.
Update : 2024-05-04 Size : 6144 Publisher : Gina

Visual cryptography Modified visual crysptography
Update : 2024-05-04 Size : 15360 Publisher : malli

DL : 0
基于椭圆曲线的一种高效率数字签名。为给出一种基于椭圆曲线密码的高效率的数字签名方案。不仅在算法设计时完全避免了费时的求逆运算,而且利用消息HASH值的汉明重量作为消息摘要进行签名与验证。-Based on elliptic curve digital signature of a high efficiency. For a given elliptic curve cryptography based on an efficient digital signature scheme. Algorithm is designed not only completely avoid the time-consuming inverse operation, and the use of information HASH value of the Hamming weight as the message digest for signature and verification.
Update : 2024-05-04 Size : 248832 Publisher : 小玲

Source code of elliptic curve cryptography
Update : 2024-05-04 Size : 3072 Publisher : harish

Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography. Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation. Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.-Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography. Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation. Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.
Update : 2024-05-04 Size : 22528 Publisher : s_wilfred
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.