Welcome![Sign In][Sign Up]
Location:
SourceCode OS program CA auth

CA auth List Page 3

« 1 2 34 5 6 7 8 9 10 ... 232 »

[CA authmd5

Description: By implementing the Digital Signature Algorithm (DSA), a better understanding of the digital signature algorithm, while learning to achieve Hash algorithm. 1) using the C \ C++ language DSA algorithms. 2) DSA of the Hash
Platform: | Size: 3072 | Author: 查航 | Hits:

[CA authprob3

Description: Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) W
Platform: | Size: 1024 | Author: jitender grover | Hits:

[CA auth4

Description: Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such
Platform: | Size: 1024 | Author: jitender grover | Hits:

[CA authdiscrete_log

Description: Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where
Platform: | Size: 1024 | Author: jitender grover | Hits:

[CA authdiffie_hellman

Description: Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number
Platform: | Size: 1024 | Author: jitender grover | Hits:

[CA authq1

Description: Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digi
Platform: | Size: 1024 | Author: jitender grover | Hits:

[CA authmbedtls-2.4.0-apache

Description: Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.
Platform: | Size: 1913856 | Author: zyb | Hits:

[CA authdes.tar

Description: THE ALGORITHM WRITTEN IN C FOR BOTH ENCRYPTION AND DESCRYPTION AND CAN BE USED AS SINGLE MODULE FOR 3- des ALGORITHM
Platform: | Size: 4096 | Author: jospeh | Hits:

[CA authHill-Cipher

Description: Encryption algorithm of Hill cipher with GUI in c#
Platform: | Size: 49152 | Author: Hasnain | Hits:

[CA authAES-Assignment-1.3

Description: AES algorithm implementation in c# with GUI
Platform: | Size: 54272 | Author: Muhammad Hasnain | Hits:

[CA authRSA-Assignment-2.1

Description: RSA algorithm implementation in c# using GUI
Platform: | Size: 54272 | Author: Muhammad Hasnain | Hits:

[CA authLL-encryption

Description: Image encryption code, you can use chaotic theory to grayscale image encryption and decryption
Platform: | Size: 1024 | Author: 雷烈 | Hits:
« 1 2 34 5 6 7 8 9 10 ... 232 »

CodeBus www.codebus.net