Welcome![Sign In][Sign Up]
Location:
Search - merkle

Search list

[Crack Hackthexcs_src

Description: Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现! -Tiger Tree Hash is constructed from two par ts. the Tiger Hash Algorithm and Merkle Tree. The or iginal Tiger Hash code was taken from Tiger.Net which is written in Visual Basic.NET. Tiger Tre e Hash Algorithm Implementation of C#!
Platform: | Size: 48009 | Author: 成东 | Hits:

[Crack Hackthexcs_src

Description: Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现! -Tiger Tree Hash is constructed from two par ts. the Tiger Hash Algorithm and Merkle Tree. The or iginal Tiger Hash code was taken from Tiger.Net which is written in Visual Basic.NET. Tiger Tre e Hash Algorithm Implementation of C#!
Platform: | Size: 48128 | Author: 成东 | Hits:

[Crack Hacksnefru

Description: Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.
Platform: | Size: 37888 | Author: Silver Egg | Hits:

[Crack Hackrfc1321

Description: The MD5 Message-Digest Algorithm Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Acknowlegements We would like to thank Don Coppersmith, Burt Kaliski, Ralph Merkle, David Chaum, and Noam Nisan for numerous helpful comments and suggestions.-The MD5 Message-Digest AlgorithmStatus of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited.Acknowlegements We would like to thank Don Coppersmith, Burt Kaliski, Ralph Merkle, David Chaum , and Noam Nisan for numerous helpful comments and suggestions.
Platform: | Size: 10240 | Author: Leo | Hits:

[JSP/JavaMHjava

Description: Merkle-Hellman knapsack cryptosystem.
Platform: | Size: 7168 | Author: arei | Hits:

[JSP/JavaMHknapsack

Description: Merkle-Hellman knapsack cryptosystem
Platform: | Size: 2048 | Author: arei | Hits:

[CSharpmerkle-hellman02

Description: ASCII明文背包加密算法,按照书上的例子自己写的-ASCII plaintext encryption algorithm knapsack
Platform: | Size: 48128 | Author: leekey | Hits:

[CA authMerkleHellman

Description: The encryption algorithm using Merkle-Hellman knapsacks starts with a binary message. * The message is envisioned as a binary sequence P = [p1, p2, … ,pk]. * Divide the message into blocks of m bits, Po = [P1, P2, ... ,Pm], P1 = [Pm+1, ... ,P2m], and so *forth. The value of m is the number of terms in the simple or hard knapsack-The encryption algorithm using Merkle-Hellman knapsacks starts with a binary message. * The message is envisioned as a binary sequence P = [p1, p2, … ,pk]. * Divide the message into blocks of m bits, Po = [P1, P2, ... ,Pm], P1 = [Pm+1, ... ,P2m], and so *forth. The value of m is the number of terms in the simple or hard knapsack
Platform: | Size: 67584 | Author: tamer | Hits:

[Industry researchPreventing-Method-Of-Wormhole-Attack

Description: we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole detection techniques location based, time based, neighbour information based and authentication based methods using ConSetLoc, Time Petri net, ROCRSSI, LIDeA, Merkle algorithems to detect wormhole attack. And existing detection techniques and its advantages and limitations. -we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole detection techniques location based, time based, neighbour information based and authentication based methods using ConSetLoc, Time Petri net, ROCRSSI, LIDeA, Merkle algorithems to detect wormhole attack. And existing detection techniques and its advantages and limitations.
Platform: | Size: 175104 | Author: manthan | Hits:

[Otherbin V31.20.47d

Description: Merkle Me rkleM erkle MerkleM erk le MerkleM erkl eMer kle
Platform: | Size: 12602368 | Author: ajtus | Hits:

[OtherBootloader2 Update auf V0.01.14

Description: Merkle merkel mERKLE
Platform: | Size: 1451008 | Author: ajtus | Hits:

CodeBus www.codebus.net