Welcome![Sign In][Sign Up]
Location:
Search - CRYPTOGRAPHY

Search list

[Othercisspallinone

Description: Cryptography and network security-Cryptography and network security.....
Platform: | Size: 648192 | Author: sumit | Hits:

[Crack HackCryptography

Description: Cryptography and NetworkSecurity
Platform: | Size: 36864 | Author: mmsp | Hits:

[Crack HackCryptography

Description: 密码学基本理论知识,为对于初学者有很大的帮助,专为初学者设计-Basic theoretical knowledge of cryptography, for the great help for beginners, for beginners
Platform: | Size: 186368 | Author: 亥丕 | Hits:

[VHDL-FPGA-VerilogHandbook_elliptic_curve_cryptography

Description: A wnice to guide to stat Elliptic Curve Cryptography
Platform: | Size: 5222400 | Author: kalidas | Hits:

[JSP/Java0764596330

Description: JAVA网络安全方面的书籍,非常有用,英文原版-David Hook- Beginning Cryptography with Java
Platform: | Size: 2560000 | Author: darren | Hits:

[JSP/Javafinal11

Description: Here i am going to introduce a DNA based cryptography method....all the details are on the slide.
Platform: | Size: 718848 | Author: Rajat Sen | Hits:

[Crack HackCh1-Ch09

Description: Cryptography And Network Security 4th Edition 05
Platform: | Size: 2197504 | Author: eman | Hits:

[Crack HackComputer-cryptography

Description: 计算机密码学及其应用,对密码学感兴趣的朋友们可以看看。-Computer cryptography and its applications, cryptography interested friends can see.
Platform: | Size: 6447104 | Author: 醉舞明月 | Hits:

[Special EffectsStep-Construction-of-Visual-Cryptography-Schemes.

Description: Two common drawbacks of the visual cryptography scheme (VCS) are the large pixel expansion of each share image and the small contrast of the recovered secret image. In this paper, we propose a step construction to construct VCS􀀀  and VCS􀀀  for general access structure by applying (2,2)-VCS recursively, where a participant may receive multiple share images. The proposed step construction generates VCS􀀀  and VCS􀀀  which have optimal pixel expansion and contrast for each qualified set in the general access structure in most cases. Our scheme applies a technique to simplify the access structure, which can reduce the average pixel expansion (APE)
Platform: | Size: 391168 | Author: isclor | Hits:

[Crack HackCryptography-course-design

Description: 密码学课程设计,des加密算法,rsa加密算法-Cryptography course design, des encryption algorithm, rsa encryption algorithm
Platform: | Size: 955392 | Author: 王涛 | Hits:

[Otheran-introduction-to-cryptography

Description: a book for cryptography
Platform: | Size: 590848 | Author: Mokotay | Hits:

[CA authcryptography

Description: Richard Spillman著,第一部分介绍了密码学的经典问题,第二部分介绍了现代密码学,包括流加密法,块加密法和公共密钥加密法,第三部分介绍了密码学的未来,并对量子加密法进行了简单介绍 -Richard Spillman zhao, the first part introduces the classic question of cryptography, the second part presents a modern cryptography, including flow encryption, blocks encryption method and the public key encryption method is introduced, the third part of cryptography to future and quantum encryption method is simply introduced
Platform: | Size: 61455360 | Author: flymydream | Hits:

[Crack HackApplied-Cryptography-answer

Description: 应用密码学答案,电子工业出版社胡向东编著-Applied Cryptography answer, Electronic Industry Press Xiang-Dong Hu ed
Platform: | Size: 192512 | Author: 陈江 | Hits:

[OtherCryptography-And-Network-Security-4th-Edition-200

Description: Guideline to use cryptograply and network sercurity
Platform: | Size: 12995584 | Author: maiducphu | Hits:

[SCMCryptography-Theory_and_practice_3ed

Description: Cryptography-Theory_and_practice_3ed code
Platform: | Size: 3010560 | Author: shch | Hits:

[OtherAn-introduction-to-cryptography

Description: 密码学入门知识,适合编写安全程序的人学习-An introduction to cryptography
Platform: | Size: 12288 | Author: 苏颖 | Hits:

[Crack HackUnderstanding-Cryptography

Description: Understanding Cryptography
Platform: | Size: 3682304 | Author: Anton G | Hits:

[CA authHandbook-of-Applied-Cryptography

Description: Handbook of applied cryptography
Platform: | Size: 5579776 | Author: valentingulimanescu | Hits:

[Software EngineeringUsers-Guide-To-Cryptography-And-Standards

Description: User s Guide To Cryptography And Standards
Platform: | Size: 1920000 | Author: dex | Hits:

[Crack HackModern-cryptography-

Description: 1、Vigenere的编程实现 使用C语言设计实现古典密码体制中的Vigenere密码,并加/解密一个文件 2、Column permutation 密码的编程实现 编程(建议使用C语言)实现古典密码体制中的Column permutation密码,并加/解密一个字符串或文件 3、DES的编程实现 使用C语言设计实现DES密码,并加/解密一个文件 -1, Vigenere of programming using C language design and implementation of the Vigenere classical cryptosystem password and encrypt/decrypt a file 2, Column permutation password programming programming (recommended C language) to achieve classical cryptography in Column permutation password and encrypt/decrypt a string or file 3, DES of programming language design and implementation using C DES cipher, and encrypt/decrypt a file
Platform: | Size: 6144 | Author: 萧瑜 | Hits:
« 1 2 ... 5 6 7 8 9 1011 12 13 14 15 ... 50 »

CodeBus www.codebus.net