Welcome![Sign In][Sign Up]
Location:
Search - gamal

Search list

[Crack Hackelgamal

Description: 另一种公开密钥加密算法的Pascal实现和例子。实现了签名和确认- Another kind of public key encryption algorithm Pascal realization and example. Realized has signed and confirmed
Platform: | Size: 18432 | Author: 站长 | Hits:

[Windows DevelopELGAMAL.src

Description: 公钥加密方式,在windows平台下运行,并且可以在不改变公钥的方式下更新私钥,速度快,使用简便。-public key encryption methods in running under windows platform, and that they could not change the way the public key to update the private key, fast, easy to use.
Platform: | Size: 107520 | Author: 冯英 | Hits:

[CA authElGamal

Description: ElGamal算法的Java实现,Elgamal是用来进行数字签名的重要算法。-Java realize ElGamal algorithm, Elgamal digital signature is used to carry out the important algorithms.
Platform: | Size: 3072 | Author: 杨平安 | Hits:

[CA authElGAmal

Description: el gamal decryption and encryption example
Platform: | Size: 1024 | Author: bilih | Hits:

[VC/MFCgamal.c

Description: El Gamal Algorthm in ANSI C
Platform: | Size: 1024 | Author: Freddy | Hits:

[Delphi VCLEl_Gamal

Description: El-Gamal algorithm of encription
Platform: | Size: 178176 | Author: TD | Hits:

[JSP/JavaMainClass

Description: 一个ElGamal的例子,key是随机生成-El Gamal example with random key generation
Platform: | Size: 1024 | Author: 蒋理 | Hits:

[Crack HackElgamal

Description: 采用VC++编写的一个程序,关于Elgamal密码算法的实现-VC++ written by a program, implementation of cryptographic algorithms on Elgamal
Platform: | Size: 3867648 | Author: 痞子青蛙 | Hits:

[CA authTAG

Description: secuirty codes it contanis 5 codes like playfair RSA gamal primenumber and fibaccanci
Platform: | Size: 65536 | Author: tag | Hits:

[CA authGamal6

Description: gamal code that work on big numbers
Platform: | Size: 12288 | Author: tag | Hits:

[CA authelgamal_chiff.c

Description: algorithme de chiffrement el gamal en c
Platform: | Size: 2048 | Author: Ambassa | Hits:

[CA authelgamal_sign.c

Description: signature el gamal en c
Platform: | Size: 2048 | Author: Ambassa | Hits:

[CA authcloud_CET.tar

Description: Cloud based re encryption. this uses el gamal re encryption procedure which uses a manager as intermediate between the owner of the file and the receiver of the file. File is send using java socket prgmg.
Platform: | Size: 220160 | Author: renju | Hits:

[OtherEl-Gamal-A.--Kim-Y.-H.-Network-Information-Theory

Description: Network information theory aims to establish the fundamental limits on information flow in networks and the optimal coding schemes that achieve these limits. It extends Shannon’s fundamental theorems on point-to-point communication and the Ford–Fulkerson max-flow min-cut theoremfor graphical unicast networks to general networks withmultiple sources and destinations and shared resources. Although the theory is far fromcomplete, many elegant results and techniques have been developed over the past forty years with potential applications in real-world networks. This book presents these results in a coherent and simplified manner that should make the subject accessible to graduate students and researchers in electrical engineering, computer science, statistics, and related fields, as well as to researchers and practitioners in industry.
Platform: | Size: 3757056 | Author: zaman | Hits:

[OtherNetwork-Information-Theory---Gamal

Description: 关于典型信道模型的信道容量极限值以及求得极限值得方法论述-Typical channel model of channel capacity limit and obtain the ultimate worth of the methods discussed
Platform: | Size: 3549184 | Author: locker | Hits:

[CA authelgamal

Description: this el gamal algorithm, you can download it if you want.-this is el gamal algorithm, you can download it if you want.
Platform: | Size: 6144 | Author: suleiman | Hits:

[CA authlr

Description: el gamal cryptosystem good quality
Platform: | Size: 130048 | Author: Tosic | Hits:

[Program docrelay

Description: Origin can be traced back to “Capacity theorems for the relay channel” by T Cover and AE Gamal. Found the theoretical upper limit of the achievable data rate of a channel with a helper node called “relay”. Relay has found its utility in modern communication systems Relays will manifest themselves as a reality in the IEEE 802.16j standard. This is still under evolution. Motivation was to study the transformation of the relay concepts and research results in this area into a practical standard implemented by a system
Platform: | Size: 672768 | Author: sagarcctv | Hits:

[DocumentsD3DImageSample

Description: gamal hgfdsser mony game
Platform: | Size: 368640 | Author: bravura | Hits:

[CSharplab3.el-gamal

Description: El-gamal shifr get password for me endless space got away out
Platform: | Size: 222208 | Author: ctok81 | Hits:

CodeBus www.codebus.net