Location:
Search - CRYPTOGRAPHY
Search list
Description: gnu crypto it is good library for cryptography
Platform: |
Size: 5777408 |
Author: toto |
Hits:
Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how.
This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: |
Size: 2560000 |
Author: YY |
Hits:
Description: A Matlab Code for producing LFSR Full Period for an specifeid initial vector in cryptography
Platform: |
Size: 1024 |
Author: Zahra |
Hits:
Description: An-Introduction-to-Cryptography-for-Non Cryptographers-With-Mathematical-Background
Platform: |
Size: 137216 |
Author: sam |
Hits:
Description: beginning cryptography with java
Platform: |
Size: 2554880 |
Author: sam |
Hits:
Description: 密码学算法协议C实现
自密码学从外交情报和军事领域走向公开后,密码学文献难觅的窘境已大为改观,但密码学资料的晦涩难懂却依然如故。广大研究人员和读者一直盼望能有一本介绍当代密码学现状且可读性强的著作。Bruce Schneier所著《Applied Cryptography: protoools, algorithms, and source code in C》一书正是这样一部集大成之作。本书以生动的描述和朴实的文风将当代密码学的方方面面熔于一炉,1994年第1版一经推出即在国际上引起广泛关注,成为近几年来引用最多,销量最大的密码学专著,极大地推动了国际密码学研究与应用的发展。作者顺应近年来的世界各国对信息安全普遍关注的趋势,结合了第1版问世以来密码学的新成果,于1996年推出了第2版,仍是好评如潮,本书即根据第2版译出。-Cryptographic algorithms to achieve an agreement C
Platform: |
Size: 20312064 |
Author: xingyuan |
Hits:
Description: Cryptography for developers eBook by Tom St Denis, Simon Johnson.
-Special examples of Cryptography goals: Privacy, Integrity, Authentication
-Full Discussion of Large Integer Arithmetic, Public Key Algoritms
Platform: |
Size: 3670016 |
Author: Alexander |
Hits:
Description: Cryptography and network security
Platform: |
Size: 37888 |
Author: minhchau |
Hits:
Description: behrouz forouzan的cryptography and network security 的课后习题答案-cryptography and network security of behrouz forouzan. answers to Exercise in after every chapter
Platform: |
Size: 4895744 |
Author: xyh |
Hits:
Description: a Elliptic Curve Cryptography Library
Platform: |
Size: 4062208 |
Author: eduardovg88 |
Hits:
Description: The BasicDES Cryptography Core is a small, fast implementation of the DES-56 encryption standard.
Platform: |
Size: 26624 |
Author: FPGACore |
Hits:
Description: Applied Cryptography Second Edition,应用密码学第二版英文版-Applied Cryptography Second Edition, Applied Cryptography Second Edition English
Platform: |
Size: 3286016 |
Author: yam |
Hits:
Description: This paper presents the design and
implementation of a crypto processor, a special-purpose
microprocessor optimized for the execution of
cryptography algorithms. This crypto processor can be used
for various security applications such as storage devices,
embedded systems, network routers, etc.
Platform: |
Size: 452608 |
Author: dudeafroz |
Hits:
Description: 无线传感器网络上基于椭圆曲线密码的认证方案设计与实现,一篇和好的论文-Wireless sensor networks Based on Elliptic Curve Cryptography certification program design and implementation, and a good paper
Platform: |
Size: 3182592 |
Author: mm |
Hits:
Description: Handbook of Applied Cryptography - issue 1997, full ebook
Platform: |
Size: 4630528 |
Author: bibo |
Hits:
Description: 密码学中RSA算法的MATLAB实现。包含算法说明及程序验证。-Cryptography RSA algorithm MATLAB implementation. Contains the algorithm description and program verification.
Platform: |
Size: 6144 |
Author: Gina |
Hits:
Description: Visual cryptography
Modified visual crysptography
Platform: |
Size: 15360 |
Author: malli |
Hits:
Description: 基于椭圆曲线的一种高效率数字签名。为给出一种基于椭圆曲线密码的高效率的数字签名方案。不仅在算法设计时完全避免了费时的求逆运算,而且利用消息HASH值的汉明重量作为消息摘要进行签名与验证。-Based on elliptic curve digital signature of a high efficiency. For a given elliptic curve cryptography based on an efficient digital signature scheme. Algorithm is designed not only completely avoid the time-consuming inverse operation, and the use of information HASH value of the Hamming weight as the message digest for signature and verification.
Platform: |
Size: 248832 |
Author: 小玲 |
Hits:
Description: Source code of elliptic curve cryptography
Platform: |
Size: 3072 |
Author: harish |
Hits:
Description: Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography.
Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation.
Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.-Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography.
Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation.
Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.
Platform: |
Size: 22528 |
Author: s_wilfred |
Hits: