Welcome![Sign In][Sign Up]
Location:
Search - Cryptography

Search list

[Mathimatics-Numerical algorithmsHandbook of Applied Cryptography (Algorithms, Math

Description: Handbook of Applied Cryptography (Algorithms, Mathematics, Science, Source Code)
Platform: | Size: 5436416 | Author: none | Hits:

[Mathimatics-Numerical algorithmsWiley - Applied Cryptography, Protocols, Algorthms

Description: Wiley - Applied Cryptography, Protocols, Algorthms, and Source Code in C-Wiley- Applied Cryptography, Protocols, Algorthms, and Source Code in C
Platform: | Size: 4329472 | Author: none | Hits:

[Crack HackJava Cryptography and source code

Description: Java Cryptography and source code
Platform: | Size: 1451008 | Author: none | Hits:

[Crack Hackapplied.cryptography.protocols.algorithms.and.sour

Description: 一本密码学的经典教材 网上一般找不到 对做密钥的人应该有用-Cryptography a classic textbook on the Internet generally do not find the key should be useful
Platform: | Size: 20312064 | Author: 周周 | Hits:

[OtherModern.Cryptography.Theory.And.Practice

Description: Modern Cryptography - Theory And Practice,现代密码学 理论与实践,英文版,毛文波-Modern Cryptography- Theory And Practice, Modern Cryptography Theory and Practice, English, MAO-wave
Platform: | Size: 11892736 | Author: 周周 | Hits:

[BooksApplied+Cryptography

Description: 应用密码学电子书籍,HTML版本,非常好的密码学资料,欢迎大家下载-Applied Cryptography e-books, HTML version, very good cryptography information, please download the U.S.
Platform: | Size: 3284992 | Author: Laong Ying | Hits:

[BooksCryptography

Description: The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years. -The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577 ]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
Platform: | Size: 2561024 | Author: wanghui | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Crack HackApplied-Cryptography-Bruce-Schneier

Description: 应用密码学 大牛Bruce Schneier 所著 chm格式-Applied Cryptography Bruce Schneier Daniudi book chm format
Platform: | Size: 3784704 | Author: jonathan | Hits:

[Crack Hackcryptography.tar

Description: Cryptography and Network Security, 4th Ed.-Stallings ebook. free to download
Platform: | Size: 12966912 | Author: kavitha | Hits:

[Crack HackQuantum-Cryptography

Description: 一篇09年很不错的关于密码学的论文,是从IEEE上下载的,内容很权威-A very good 2009 paper on cryptography and is downloaded from the IEEE, the content is authoritative
Platform: | Size: 1137664 | Author: James | Hits:

[Crack Hackcryptography

Description: cryptography based programs
Platform: | Size: 649216 | Author: krishna | Hits:

[OtherCryptography

Description: 密码学,一本密码学入门书籍,介绍密码学的基本思想-Cryptography, an introduction to cryptography books, introduces the basic ideas of cryptography
Platform: | Size: 318464 | Author: Miao | Hits:

[Mathimatics-Numerical algorithmsAssymmetric-Cryptography-project

Description: This is the Assysmmetric Cryptography algorithm created using Java. This is to identfy Finger prints.One of the popular algorithm
Platform: | Size: 115712 | Author: Archana Palani | Hits:

[JSP/Javajava-cryptography-(pdf)-2001

Description: Java cryptography 2001
Platform: | Size: 1451008 | Author: Dan211 | Hits:

[Crack Hackcryptography-source-code-in-c

Description: 密码学各种加密程序算法,包括DES,AES,RSA等主要的加密算法-cryptography sourse code in C
Platform: | Size: 980992 | Author: 孙磊 | Hits:

[Windows Developcryptography-2.1.3.tar

Description: cryptography-2.1.3 的安装文件(cryptography-2.1.3Installation files)
Platform: | Size: 441344 | Author: 天空111 | Hits:

[BooksPractical Cryptography Algorithms and Implementations Using C

Description: Practical Cryptography Algorithms and Implementations Using C
Platform: | Size: 1977961 | Author: Catherina | Hits:

[Linux-Unixcryptography-1.7.2.tar

Description: cryptography的源码包,有的地方不能从官网上下载,传到这里来方便一点(source package , i just want to download something from your website , it's too much trouble)
Platform: | Size: 420864 | Author: so小鱼 | Hits:

[Software EngineeringUnderstanding cryptography

Description: Understanding cryptography. By Christof Paar and Jan Pelzl. Solutions for texbook
Platform: | Size: 274175 | Author: wildrosi | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net