Welcome![Sign In][Sign Up]
Location:
Search - RSA cryptosystem

Search list

[Crack HackRSA加密解密及RSA签名和验证

Description: RSA加密解密及RSA签名和验证算法,c/s界面,-RSA encryption and decryption and validation of signatures RSA algorithm, c/s interface,
Platform: | Size: 3072 | Author: 方良 | Hits:

[GUI DevelopRSA加解密算法

Description: 信息安全中的RSA算法,界面简单明了,功能齐全-information security of the RSA algorithm, simple interface, the full range of functions
Platform: | Size: 1914880 | Author: sun | Hits:

[Crack HackhybridDESRSA

Description: 东北大学编写的DES、RSA混合密码系统,完整可用。-prepared by the Northeastern University DES, RSA cryptosystem mixed, integrity available.
Platform: | Size: 277504 | Author: | Hits:

[Crack HackRSA

Description: RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名。本程序提供了RSA加密和解密过程实现的源代码。-RSA public key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, digital signatures can also be used. This procedure provides the RSA encryption and decryption process of the realization of the source code.
Platform: | Size: 663552 | Author: 严玉洁 | Hits:

[Crack HackRSA

Description: 应用非对称密钥系统RSA密码系统进行数据签名的代码-Application of non-symmetric key system, RSA cryptosystem for data signature code
Platform: | Size: 3580928 | Author: 李彦 | Hits:

[Crack HackRSA

Description: RSA公钥加密的基本实现 bmp灰度图片加解密操作包括 RSA 的加减密算法; 素数检测算法;RSA 密钥生成算法; 应用该 RSA 密码体制加、解密; BMP 灰度图的算法; Pollard p-1 算法 ; Pollard r 算法 ; -RSA public key encryption to achieve the basic gray-scale picture bmp including RSA encryption and decryption operations of addition and subtraction Micronesia algorithm prime number detection algorithm RSA key generation algorithm application of the RSA cryptosystem, Encryption and Decryption BMP grayscale algorithm Pollard p-1 algorithm Pollard r algorithm
Platform: | Size: 250880 | Author: 魏汝垚 | Hits:

[Crack HackRSA_spadpa_attcaks_and_defenses_design_based_on_80

Description: (繁体中文版)台湾出品不得多得的关于spa dpa 旁道攻击rsa算法的精彩论文。相对国内的一些翻译性质的、粗制滥造的论文,简直是一个天上一个地下。-As information technology has developed rapidly, it provides more convenient life for people. As the result, the security has become the main concern. Recently, user id and password are major methods to protect private information. However, the short password can be broken by hackers. Too long is not easy to memorize. Network traffic-analyzing tool provides the function to gain the user id and password while doing transaction via network. Therefore, low cost Smart Card including user name identification and cryptosystem algorithm has become new trend of modern society. The first object of this thesis is to present the design and implementati- on of a 512-bit RSA cryptosystem by using 8051 microcontroller. In RSA cryptosystem algorithm, modular exponentiation is the essential arithmetic operation. However, 8051 microcontroller does not provide the modular exponentiation. In order to complete RSA cryptosystem, this thesis has mentioned that using L-algorithm to transfer to modular mult
Platform: | Size: 524288 | Author: wang carl | Hits:

[matlabRSA-public-key-cryptosystem

Description: RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
Platform: | Size: 1024 | Author: xiaotiantian | Hits:

[Crack Hack8736103199-GuTingTing-RSA

Description: RSA密码体制的实现摘要自20世纪90年代以来,计算机网络技术使得计算机应用得到 ... 用VC++编程实现了RSA算法加密和解密运算,在算法的实现过程中,调用了已有的大整数类-The realization of RSA cryptosystem Abstract from the 20th century since the 90' s, computer network technology allows computer applications to be used ... VC++ programming to achieve the RSA algorithm for encryption and decryption operations, the realization of the algorithm, the call of the existing large integer type
Platform: | Size: 19456 | Author: shenyong | Hits:

[File Formatrsa

Description: 1、编写程序构造一RSA密钥; 2、编写程序实现快速指数算法; 3、编写程序生成大素数; 4、实现RSA密码体制 -1, the preparation of procedures for constructing a RSA key 2, the preparation of procedures for fast index algorithm 3, the preparation process to generate large prime numbers 4, the realization of RSA Cryptosystem
Platform: | Size: 20480 | Author: | Hits:

[CSharpRSA_Demo

Description: C#代码,基于RSA密码体制实现数字签名。-C# code, based on RSA cryptosystem for digital signatures.
Platform: | Size: 206848 | Author: away | Hits:

[Crack HackRSA

Description: 实现RSA密码体制实验 1、编写程序构造一RSA密钥; 2、编写程序实现快速指数算法; 3、编写程序生成大素数; 4、实现RSA密码体制。 -Achieve the RSA cryptosystem- an experiment
Platform: | Size: 7168 | Author: zhang liang | Hits:

[Crack HackRSA-yuan

Description: rsa可实现的源程序1 编写程序构造一RSA密钥;编写程序实现快速指数算法;编写程序生成大素数;实现RSA密码体制。-rsa source code enables a programming construct an RSA key write a program for rapid index algorithm write programs generate large prime numbers to achieve RSA cryptosystem.
Platform: | Size: 219136 | Author: zhang liang | Hits:

[CA authrsa

Description: 实现了rsa密码体制,包括加密解密,有大数的实现,是学习rsa的好文件-Rsa cryptosystem implemented, including encryption and decryption
Platform: | Size: 4124672 | Author: 李超群 | Hits:

[Software EngineeringECC2

Description: 椭圆曲线密码系统(点乘体系研究),可用于RSA密码体系-Elliptic Curve Cryptography (Multiplication System), can be used in RSA cryptosystem
Platform: | Size: 1295360 | Author: 余振华 | Hits:

[CA authrsa

Description: 使用C++开发的RSA密码体制实现。可以输入数据,经过RSA加密后,可以再解密。-The RSA cryptosystem using C++ developed. You can enter data, after RSA encryption can be decrypted.
Platform: | Size: 697344 | Author: 黄佳禾 | Hits:

[Crack HackRSA-SecretSharingScheme

Description: 于RsA密码体制,提出了一个新的(f,,1)门限秘密共享方案。在该方案中,秘密份额由各参与者自己 选择,秘密分发者不知道每个参与者所持有的份额,而且秘密份额长度与秘密长度相同。在秘密恢复过程中,每 个参与者能够验证其他参与者是否进行了欺骗。每个参与者只需维护一个秘密份额,就可以实现对多个秘密的共 享。方案的安全性是基于RSA密码体制和Shamir的(‘n)门限秘密共享方案的安全性。-Abstract:A new(f,n)thresh01d secret sharing scheme was proposed,which was based on RSA cryptosystem.1n出is scheme,each participallt’s secret shadow was selected by the panicipallt himself aIld even the secret dealer did not k110w aIlything about his secret shadow.A1l these shadows were as short as me secret to be shared.In me recoVery phase,each participaIlt was allowed to check whether another panicipaIlt pmvided me nlle infoⅡIlation or not.Each participaIlt call share many secrets with omer panicipants by holding only one shadow.The security of this scheme is the as mat of tlle RSA cryptosystem and Shamir’s(f,n)threshold secret sharing scheme.
Platform: | Size: 361472 | Author: 徐晓刚 | Hits:

[Industry researchModified-RSA

Description: Modified RSA cryptosystem based on offline storage and prime number
Platform: | Size: 5777408 | Author: Jai Prakash | Hits:

[OtherRSA加解密算法

Description: 通过上机操作,使同学生对公钥加密算法RSA密码体制的加、解过程有一个更加清晰地认识。通过本次实验,加深学生对公钥密码体制的认识,为后面的学习打下基础。(Through the operation of the computer, there is a clearer understanding of the process of adding and solving the RSA cryptosystem of the public key encryption algorithm. Through this experiment, we can deepen the students' understanding of the public key cryptosystem and lay the foundation for the later learning.)
Platform: | Size: 3072 | Author: 斩月 | Hits:

[Crack Hackrsa

Description: 1.问题描述 RSA密码系统可具体描述为:取两个大素数p和q,令n=pq,N=(p-1)(q-1),随机选择整数d,满足gcd(d,N)=1,ed=1 modN。 公开密钥:k1=(n,e) 私有密钥:k2=(p,q,d) 加密算法:对于待加密消息m,其对应的密文为c=E(m)=me(modn) 解密算法:D(c)=cd(modn) 2.基本要求 p,q,d,e参数选取合理,程序要求界面友好,自动化程度高。 4. 实现提示 要实现一个真实的RSA密码系统,主要考虑对大整数的处理。P和q是1024位的,n取2048位。(1. problem description The RSA cryptosystem can be specifically described as: take two large prime numbers P and Q, make n=pq, N= (p-1) (Q-1), select integer D randomly, and satisfy GCD (D, N) =1. Public key: k1= (n, e) Private key: k2= (P, Q, d) Encryption algorithm: for the encrypted message M, its corresponding ciphertext is c=E (m) =me (MODN) Decryption algorithm: D (c) =cd (MODN) 2. basic requirements P, Q, D, e parameters are selected reasonably, the program requires friendly interface and high degree of automation. 4. realization hints To implement a real RSA cryptosystem, the main consideration is to deal with large integers. P and Q are 1024 bits, and N takes 2048.)
Platform: | Size: 1108992 | Author: Appoint | Hits:
« 12 3 »

CodeBus www.codebus.net