Welcome![Sign In][Sign Up]
Location:
Search - Applied Cryptography schneier

Search list

[Crack HackApplied-Cryptography-Bruce-Schneier

Description: 应用密码学 大牛Bruce Schneier 所著 chm格式-Applied Cryptography Bruce Schneier Daniudi book chm format
Platform: | Size: 3784704 | Author: jonathan | Hits:

[OtherC

Description: 密码学算法协议C实现 自密码学从外交情报和军事领域走向公开后,密码学文献难觅的窘境已大为改观,但密码学资料的晦涩难懂却依然如故。广大研究人员和读者一直盼望能有一本介绍当代密码学现状且可读性强的著作。Bruce Schneier所著《Applied Cryptography: protoools, algorithms, and source code in C》一书正是这样一部集大成之作。本书以生动的描述和朴实的文风将当代密码学的方方面面熔于一炉,1994年第1版一经推出即在国际上引起广泛关注,成为近几年来引用最多,销量最大的密码学专著,极大地推动了国际密码学研究与应用的发展。作者顺应近年来的世界各国对信息安全普遍关注的趋势,结合了第1版问世以来密码学的新成果,于1996年推出了第2版,仍是好评如潮,本书即根据第2版译出。-Cryptographic algorithms to achieve an agreement C
Platform: | Size: 20312064 | Author: xingyuan | Hits:

[Compress-Decompress algrithmsBlowfish

Description: Visual Basic Blowfish functions This a Visual Basic version of Bruce Schneier s Blowfish algorithm as detailed in "Applied Cryptography", 2nd edition, 1996 It has been tested in VB6 and Access VBA. Use at your own risk. Version 6. Published 20 November 2003. History at end.-Visual Basic Blowfish functions This is a Visual Basic version of Bruce Schneier s Blowfish algorithm as detailed in "Applied Cryptography", 2nd edition, 1996 It has been tested in VB6 and Access VBA. Use at your own risk. Version 6. Published 20 November 2003. History at end.
Platform: | Size: 40960 | Author: Daldegam | Hits:

[Crack Hackdes

Description: des算法+代码 // des.cpp - modified by Wei Dai from: /* * This is a major rewrite of my old public domain DES code written * circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977 * public domain code. I pretty much kept my key scheduling code, but * the actual encrypt/decrypt routines are taken from from Richard * Outerbridge s DES code as printed in Schneier s "Applied Cryptography." * * This code is in the public domain. I would appreciate bug reports and * enhancements. * * Phil Karn KA9Q, karn@unix.ka9q.ampr.org, August 1994. */-// des.cpp- modified by Wei Dai from: /* * This is a major rewrite of my old public domain DES code written * circa 1987, which in turn borrowed heavily from Jim Gillogly s 1977 * public domain code. I pretty much kept my key scheduling code, but * the actual encrypt/decrypt routines are taken from from Richard * Outerbridge s DES code as printed in Schneier s "Applied Cryptography." * * This code is in the public domain. I would appreciate bug reports and * enhancements. * * Phil Karn KA9Q, karn@unix.ka9q.ampr.org, August 1994. */
Platform: | Size: 19456 | Author: 模糊 | Hits:

[WEB CodephpreliazeRSA

Description: PHP实现RSA算法/* * Implementation of the RSA algorithm * (C) Copyright 2004 Edsko de Vries, Ireland * * Licensed under the GNU Public License (GPL) * * This implementation has been verified against [3] * (tested Java/PHP interoperability). * * References: * [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996 * [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online) * [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle, * (open source cryptography library for Java, online) * [4] "PKCS #1: RSA Encryption Standard", RSA Laboratories Technical Note, * version 1.5, revised November 1, 1993 */ -/* * Implementation of the RSA algorithm * (C) Copyright 2004 Edsko de Vries, Ireland * * Licensed under the GNU Public License (GPL) * * This implementation has been verified against [3] * (tested Java/PHP interoperability). * * References: * [1] "Applied Cryptography", Bruce Schneier, John Wiley & Sons, 1996 * [2] "Prime Number Hide-and-Seek", Brian Raiter, Muppetlabs (online) * [3] "The Bouncy Castle Crypto Package", Legion of the Bouncy Castle, * (open source cryptography library for Java, online) * [4] "PKCS#1: RSA Encryption Standard", RSA Laboratories Technical Note, * version 1.5, revised November 1, 1993 */
Platform: | Size: 6144 | Author: gg | Hits:

[OtherApplied-Cryptography-2nd-ed.----B.-Schneier

Description: a awesome book on cryptography
Platform: | Size: 3084288 | Author: liku169 | Hits:

[Crack HackApplied-Cryptography---Bruce-Schneier

Description: Applied Cryptography, Second Edition Protocols, Algorthms, and Source Code in C - Bruce Schneier
Platform: | Size: 3794944 | Author: Leganola Aston | Hits:

[OS programApplied Cryptography - Bruce Schneier

Description: Bruce Schneier\Applied Cryptography (527)
Platform: | Size: 1939456 | Author: Webbo32 | Hits:

[Network DevelopApplied Cryptography - Bruce Schneier

Description: Applied Cryptography - Bruce Schneier
Platform: | Size: 2570714 | Author: MagusX | Hits:

CodeBus www.codebus.net