Welcome![Sign In][Sign Up]
Location:
Search - cryptography

Search list

[Anti-virusgnu-crypto-2.0.1

Description: gnu crypto it is good library for cryptography
Platform: | Size: 5777408 | Author: toto | Hits:

[JSPBeginning_Cryptography_with_Java

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: YY | Hits:

[matlabLFSR

Description: A Matlab Code for producing LFSR Full Period for an specifeid initial vector in cryptography
Platform: | Size: 1024 | Author: Zahra | Hits:

[Program doc926281-An-Introduction-to-Cryptography-for-NonCry

Description: An-Introduction-to-Cryptography-for-Non Cryptographers-With-Mathematical-Background
Platform: | Size: 137216 | Author: sam | Hits:

[JSPbeginning-cryptography-with-java

Description: beginning cryptography with java
Platform: | Size: 2554880 | Author: sam | Hits:

[OtherC

Description: 密码学算法协议C实现 自密码学从外交情报和军事领域走向公开后,密码学文献难觅的窘境已大为改观,但密码学资料的晦涩难懂却依然如故。广大研究人员和读者一直盼望能有一本介绍当代密码学现状且可读性强的著作。Bruce Schneier所著《Applied Cryptography: protoools, algorithms, and source code in C》一书正是这样一部集大成之作。本书以生动的描述和朴实的文风将当代密码学的方方面面熔于一炉,1994年第1版一经推出即在国际上引起广泛关注,成为近几年来引用最多,销量最大的密码学专著,极大地推动了国际密码学研究与应用的发展。作者顺应近年来的世界各国对信息安全普遍关注的趋势,结合了第1版问世以来密码学的新成果,于1996年推出了第2版,仍是好评如潮,本书即根据第2版译出。-Cryptographic algorithms to achieve an agreement C
Platform: | Size: 20312064 | Author: xingyuan | Hits:

[Software EngineeringCryptography_Developers

Description: Cryptography for developers eBook by Tom St Denis, Simon Johnson. -Special examples of Cryptography goals: Privacy, Integrity, Authentication -Full Discussion of Large Integer Arithmetic, Public Key Algoritms
Platform: | Size: 3670016 | Author: Alexander | Hits:

[Crack HackCryptographyAndNetworkSecurity2005

Description: Cryptography and network security
Platform: | Size: 37888 | Author: minhchau | Hits:

[Otheranswers_to_cryptographyAndnetwork

Description: behrouz forouzan的cryptography and network security 的课后习题答案-cryptography and network security of behrouz forouzan. answers to Exercise in after every chapter
Platform: | Size: 4895744 | Author: xyh | Hits:

[Internet-Networkbasicrypt-2.0.2.tar

Description: a Elliptic Curve Cryptography Library
Platform: | Size: 4062208 | Author: eduardovg88 | Hits:

[VHDL-FPGA-VerilogBasicDES

Description: The BasicDES Cryptography Core is a small, fast implementation of the DES-56 encryption standard.
Platform: | Size: 26624 | Author: FPGACore | Hits:

[OtherAppliedCryptographySecondEdition

Description: Applied Cryptography Second Edition,应用密码学第二版英文版-Applied Cryptography Second Edition, Applied Cryptography Second Edition English
Platform: | Size: 3286016 | Author: yam | Hits:

[Crack Hackcrypoprocessor

Description: This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as storage devices, embedded systems, network routers, etc.
Platform: | Size: 452608 | Author: dudeafroz | Hits:

[Software EngineeringECC

Description: 无线传感器网络上基于椭圆曲线密码的认证方案设计与实现,一篇和好的论文-Wireless sensor networks Based on Elliptic Curve Cryptography certification program design and implementation, and a good paper
Platform: | Size: 3182592 | Author: mm | Hits:

[OtherCryptography_Handbook_Of_Applied_Cryptography

Description: Handbook of Applied Cryptography - issue 1997, full ebook
Platform: | Size: 4630528 | Author: bibo | Hits:

[matlabRSA

Description: 密码学中RSA算法的MATLAB实现。包含算法说明及程序验证。-Cryptography RSA algorithm MATLAB implementation. Contains the algorithm description and program verification.
Platform: | Size: 6144 | Author: Gina | Hits:

[DSP programVisual_Cryptography

Description: Visual cryptography Modified visual crysptography
Platform: | Size: 15360 | Author: malli | Hits:

[File Format4

Description: 基于椭圆曲线的一种高效率数字签名。为给出一种基于椭圆曲线密码的高效率的数字签名方案。不仅在算法设计时完全避免了费时的求逆运算,而且利用消息HASH值的汉明重量作为消息摘要进行签名与验证。-Based on elliptic curve digital signature of a high efficiency. For a given elliptic curve cryptography based on an efficient digital signature scheme. Algorithm is designed not only completely avoid the time-consuming inverse operation, and the use of information HASH value of the Hamming weight as the message digest for signature and verification.
Platform: | Size: 248832 | Author: 小玲 | Hits:

[Crack HackEllipticCurves_e

Description: Source code of elliptic curve cryptography
Platform: | Size: 3072 | Author: harish | Hits:

[Crack HackPrimeGenAndTester

Description: Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography. Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation. Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.-Very large (tested for more than 2048 bits) prime number generator and tester program. This is well written and based on solid algorithms in this field. Source code is my own, used for Masters course in Cryptography. Program has easily readable and well written algorithm implementation to check for Jacobian Symbol, choice of two methods for primality testing: Miller-Rabin or Solovay-Strassen method and Blum-Blum Shub method for random number generation. Input and output of the program is through files in \bin directory. Project is compatible with Java Eclipse 3.0 IDE, but can also be easily built from command line.
Platform: | Size: 22528 | Author: s_wilfred | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »

CodeBus www.codebus.net