Welcome![Sign In][Sign Up]
Location:
Search - cryptographic

Search list

[Linux-UnixCGX-Mobile cryptographic engine sources

Description: source for cryptographic accelerator engine present in au1550 SOC platform
Platform: | Size: 1814589 | Author: wrtoch | Hits:

[Linux-UnixCGX-Mobile cryptographic engine sources

Description: driver sources for CGX-Mobile cryptographic engine (present inside au1550 SOC)
Platform: | Size: 1814589 | Author: wrtoch | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[VHDL-FPGA-VerilogSMS4_code

Description: 用Verilog实现国内第一个商用密码算法SMS4的加密和解密。-Using Verilog to achieve the first commercial cryptographic algorithm for encryption and decryption SMS4.
Platform: | Size: 208896 | Author: 闫伟伟 | Hits:

[Crack Hackecc

Description: 这是个密钥匙生成代码,对大家帮助很大。还包括佳节密运算-This is a cryptographic key generation code, for all of us of great help. Festival also includes dense computing
Platform: | Size: 1024 | Author: 梁小武 | Hits:

[Crack HackDES

Description: Des算法是一种标准的对称加密算法,其精华就是明文经过一系列的复杂变化后,一般在不知密码的情况下要把它的恢复很难。 算法可以由四个部分描述: 1.获取16个子密钥 2.初始置换置换函数ip 3.加密函数f 4.末置换函数 -Des Algorithm is a standard symmetric encryption algorithm, and its essence is clear after a series of complex changes in law, the general in the circumstances I do not know the password should be difficult to restore it. Algorithm can be described in four parts: 1. To obtain 16 sub-keys 2. The initial replacement replacement function ip 3. Cryptographic function f 4. At the end of displacement function
Platform: | Size: 180224 | Author: wildkaede | Hits:

[.netContactFlow[1][1].0.95

Description: // 注意: // (*) 如果未指定密钥,则程序集不会被签名。 // (*) KeyName 是指已经安装在计算机上的 // 加密服务提供程序(CSP)中的密钥。KeyFile 是指包含 // 密钥的文件。 // (*) 如果 KeyFile 和 KeyName 值都已指定,则 -//NOTE:// (*) If you do not specify the key, the assembly will not be signed.// (*) KeyName refers to has already been installed on the computer// Cryptographic Service Provider (CSP) in the key. KeyFile refers to contain// key documents.// (*) If the KeyFile and the KeyName values are specified, then
Platform: | Size: 100352 | Author: wang | Hits:

[Crack HackAES

Description: 本项目实现了高速对称密码算法AES,可以用它直接加密文件模块。-The project achieved a high-speed symmetric cryptographic algorithm AES, can use it to encrypt files directly modules.
Platform: | Size: 1812480 | Author: 熊齐文 | Hits:

[Internet-NetworkMD5

Description: MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32 digit hexadecimal number.
Platform: | Size: 3929088 | Author: chu | Hits:

[File Formatoakland

Description: Cryptographic Key Generation from Voice
Platform: | Size: 220160 | Author: Praveen | Hits:

[CA authopencsp

Description: 微软CSP实现源码。 CSP:密码服务提供者。 微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。 -Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAPI is recommended the use of PKI encryption API. Its function is to provide application development environment in Win32 the use of encryption, authentication and other security services interface standard encryption. CryptoAPI in applications, and CSP (cryptographic service provider) between.
Platform: | Size: 541696 | Author: eboy | Hits:

[Crack Hackidea

Description: Realization of IDEA cryptographic algorithm
Platform: | Size: 2048 | Author: rafaella | Hits:

[SCMAT90SC144144C

Description: Cryptographic Module Security Policy for jNet Citadel-OS on Atmel AT90SC144144CT
Platform: | Size: 418816 | Author: johnny | Hits:

[Crack Hackcryptographic-algorithms

Description: 主流密码算法的源代码里面都有,从某org网站上找到的-Mainstream cryptographic algorithms which have the source code from a Web site to find org
Platform: | Size: 1049600 | Author: lanyan | Hits:

[OtherClassical-cryptographic

Description: 实现古典密码算法中置换密码的算法,实现加密和解密-To achieve the classical cryptographic algorithm displacement password algorithm encryption and decryption
Platform: | Size: 1024 | Author: li weixia | Hits:

[CA authdes-cryptographic-algorithm

Description: 可以实现des加密算法 用c语言实现 包含源代码-des cryptographic algorithm C language code
Platform: | Size: 14336 | Author: qqq | Hits:

[LabViewcryptographic-operations

Description: 基于labwindows/cvi的密码操作-Based on labwindows/cvi cryptographic operations
Platform: | Size: 304128 | Author: 左盼盼 | Hits:

[Software EngineeringTesting-an-S-Box-for-Cryptographic-Use.pdf

Description: Testing an S-Box for Cryptographic Use Generally, one faces two type of problems related to the selection of an s-box (substitution box/function) before its cryptographic use can be considered secure. First one is how to design (or search) a good s-box and second one is how to verify a given s-box is indeed a good one in a sense of meeting its requirements. The requirements contain the types and quantitative values of desired properties for an s-box.
Platform: | Size: 246784 | Author: venkatesan | Hits:

[CA authcryptographic-algo

Description: Cryptographic algorithm for key generation in c and c-Cryptographic algorithm for key generation in c and c++
Platform: | Size: 2048 | Author: mdchandra | Hits:

[Crack Hack_ch12-Cryptographic-Hash-Functions

Description: Cryptographic Hash Functions
Platform: | Size: 1080320 | Author: eyelight93 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 32 »

CodeBus www.codebus.net