Welcome![Sign In][Sign Up]
Location:
Search - cryptography

Search list

[Crack HackECC

Description: eliptic curve cryptography decryption
Platform: | Size: 37888 | Author: senthamaraikannan | Hits:

[Crack Hackcryptography

Description: Cryptography algorithm
Platform: | Size: 65536 | Author: SK Sarangi | Hits:

[Software Engineeringstx_cookbook

Description: Altera公司高端FPGA高级综合指导手册,包括:算术运算单元,浮点处理技巧,数据编码格式转换,视频处理,仲裁逻辑,多路选择,存储逻辑,计数器,通信逻辑,循环冗余校验,随机和伪随机函数,加密和同步等编码风格和技巧;-advanced synthesis cookbook for Altera high-end FPGA(Stratix),incuding coding style and design tricks for arithmetic,floating points operation,tranlation and format convertion,vidio, arbitor, multiplexing, registers and memories,communication,CRC,random and pseudorandom functions,cryptography,synchronization,etc.
Platform: | Size: 962560 | Author: 刘易 | Hits:

[J2MEJ2me-AES

Description: [cryptography] AES encrypt and decrypt for j2me,
Platform: | Size: 3072 | Author: SofTech | Hits:

[Crack Hackcrypt

Description: 密码学实验平台,完整独立运行VC6.0 源程序,包含对称密码学和公钥密码学的主要算法。-Cryptography experimental platform, a complete stand-alone source of VC6.0, including the main algorithm of symmetric cryptography and public key cryptography.
Platform: | Size: 155648 | Author: zhou | Hits:

[matlabCryptography

Description: Cryptography in MATLAB
Platform: | Size: 737280 | Author: Eugene | Hits:

[Crack Hackidea

Description: encryption algorithm, IDEA, symmetric key cryptography algorithm used in internet widly
Platform: | Size: 447488 | Author: sujata | Hits:

[OS programanswer_for_Cryptography_and_Network_Security

Description: 密码编码学宇网络安全的答案 密码编码学宇网络安全的答案-answer for Cryptography and Network Security
Platform: | Size: 842752 | Author: 冯伟 | Hits:

[Crack Hackintroductiontomoderncryptography

Description: 一本介绍密码学现代知识的学习资料,对于密码算法编程方面很有用。-A description of the study of modern knowledge of cryptography information programming for the cryptographic algorithm is useful.
Platform: | Size: 4482048 | Author: lixiaobo | Hits:

[Othernewdirectionofcryptography

Description: New Directions in Cryptography,j介绍加密的方向,对密码学有研究的必读-New Directions in Cryptography, j describes the direction of encryption on a study of cryptography required reading for
Platform: | Size: 240640 | Author: paul lew | Hits:

[Crack Hackcryptography

Description: 使用DES解密和加密文件,供JAVA爱好者交流和学习-The use of DES decryption and encryption documents for sharing and learning JAVA lovers
Platform: | Size: 1024 | Author: mu | Hits:

[Data structsmain

Description: poj2109:Power of Cryptography.贪心算法.正确程序.-poj2109:Power of Cryptography.Greedy algorithm.accepted program.
Platform: | Size: 1024 | Author: 王文波 | Hits:

[OtherAppliedCryptography

Description: 应用密码学:协议、算法与C源程序 全书共分四个部分,首先定义了密码学的多个术语,介绍了密码学的发展及背景,描述了密码学从简单到复杂的各种协议,详细讨论了密码技术,并在此基础上列举了如DES、IDEA、RSA、DSA等10多个算法以及多个应用实例,并提供了算法的源代代码清单。 全书内容广博权威,具有极大的实用价值。自出版以来,得到业内专家的高度赞誉,是致力于密码学研究的专业及非专业人员一本难得的好书。-Applied Cryptography: Protocols, Algorithms and C source code book is divided into four parts, first of all define the various terms of cryptography, introduced the development of cryptography and background, describes cryptography from the simple to the complex variety of agreements, cryptographic techniques are discussed in detail, and on this basis, lists, such as DES, IDEA, RSA, DSA algorithm, as well as more than 10 instances of multiple applications and provides the algorithm' s source code for the list generation. Broad authority of the contents of the book has great practical value. Since the publication has received high praise from industry experts, is dedicated to the study of cryptography professional and non-professionals, a rare books.
Platform: | Size: 20429824 | Author: cheng | Hits:

[JSP/JavaPlayfair

Description: 最近在学密码学,这一个实现playfair加密算法的java类,主要包括构造函数、加密函数和解密函数,还有几个辅助函数,附有测试类,在控制台下运行的。-A recent study of cryptography, which playfair encryption algorithm to achieve a java class, mainly including constructor, encryption and decryption function, a function, and several auxiliary functions, with a test class, running under the console.
Platform: | Size: 6144 | Author: 老棉 | Hits:

[Crack Hackgood_galois_all_operations

Description: Galois field is used in ECC( elliptic curve cryptography). This is a brief introdustion about the prime field and its related concepts
Platform: | Size: 224256 | Author: mma32 | Hits:

[Other2006issc

Description: Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the nodes can be deployed. Protocols are also necessary to ensure synchronization of keys between the devices on a network. These protocols require significant communication and storage overhead. The limitation of such a cryptosystem is that it is not possible to guarantee the confidentiality of the session keys
Platform: | Size: 179200 | Author: yared | Hits:

[CommunicationVisual_Cryptography

Description: In this IEEE Paper "Visual Cryptography is Solved" in c and MATLAB-In this IEEE Paper "Visual Cryptography is Solved" in c and MATLAB
Platform: | Size: 878592 | Author: malli | Hits:

[Documentsintroduction-to-cryptology.pdf

Description: Introduction to cryptology. This presentation provides and overview of cryptography and how it fits within the framework of network security.
Platform: | Size: 449536 | Author: athar | Hits:

[Othercryptography

Description: 字母频率统计:包括1维与二维字母出现频率与总数-Letter frequency statistics include: 1-dimensional and two-dimensional frequency and the total number of letters
Platform: | Size: 2048 | Author: luoluo | Hits:

[OtherCryptography

Description: 关于密码学方面的经典著作,绝对有很强的指导意义,适合各类人士学习-With regard to cryptography aspects of classic, we do have a very strong guide, suitable for all kinds of people to learn
Platform: | Size: 12054528 | Author: connotation | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »

CodeBus www.codebus.net