Welcome![Sign In][Sign Up]
Location:
Search - cryptography

Search list

[JSPCryptography

Description: While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.-While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how. Chapters one through five cover the architecture of the JCE and JCA, symmetric and asymmetric key encryption in Java, message authentication codes, and how to create Java implementations with the API provided by the Bouncy Castle ASN.1 packages, all with plenty of examples. Building on that foundation, the second half of the book takes you into higher-level topics, enabling you to create and implement secure Java applications and make use of standard protocols such as CMS, SSL, and S/MIME.
Platform: | Size: 2560000 | Author: bk | Hits:

[Program docCryptography

Description: Lecture notes on Cryptography
Platform: | Size: 1314816 | Author: mrm_tw168 | Hits:

[VC/MFCApress.Cryptography.in.C.and.Cplusplus.2nd.Ed.2005

Description: 大师的作品 基于C和C++的密码学经典书籍-Master' s work is based on C and C++ cryptography classic books
Platform: | Size: 1573888 | Author: jie | Hits:

[Data structsonlineplanner1

Description: this is implementing elliptic cryptography in accordance with diffie hellman
Platform: | Size: 29696 | Author: gaurav | Hits:

[Crack Hackecc

Description: Elliptic curve cryptography
Platform: | Size: 79872 | Author: Gautam Anand | Hits:

[Documentspairing

Description: pairing based cryptography
Platform: | Size: 93184 | Author: Gautam Anand | Hits:

[CA authEC

Description: ECC cryptography in java.
Platform: | Size: 14336 | Author: jack8888 | Hits:

[Crack Hack22

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pig.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2;-Completion of asymmetric cryptography based on symmetric key distribution work Description: (1) the completion of the asymmetric public key certificate-based key distribution based on the work, according to the materials on asymmetric cryptography based on symmetric key distribution scheme, the completion of the allocation of symmetric key Ks. (2) A document with Ks on an image (test_pig.bmp) is encrypted and sent to B, B to decrypt receipt, compared to the original image to see if the same, and record the entire encryption/decryption time spent T2 (3) contrast T1 and T2
Platform: | Size: 43008 | Author: 熊龙生 | Hits:

[JSP/JavaWrox.Beginning.Cryptography.with.Java

Description: 关于在JAVA下实现加密的书,很专,很详细-Wrox.Beginning.Cryptography.with.Java
Platform: | Size: 2560000 | Author: lin | Hits:

[CA authlab2_code

Description: RSA implementation for cryptography assignment
Platform: | Size: 14336 | Author: cbro | Hits:

[Crack Hackpbc-0.5

Description: pairing-based cryptography,The Ecc cryptography,now so many people is learn to use pairing-based cryptography,this is used in window
Platform: | Size: 2915328 | Author: 李兵 | Hits:

[Crack HackEncryption

Description: encryption and decryption in cryptography developed in .net vb
Platform: | Size: 12288 | Author: deepinsea | Hits:

[Crack HackCodec_For_C_and_Cpp

Description: 密码编码学,加密方法的C和C++实现 本书详细说明了AES的算法和实现-Cryptography, encryption method of C and C++, this book details the AES algorithm and implementation
Platform: | Size: 6616064 | Author: Cocoonshu | Hits:

[Crack Hackw_ipp-samples-cryptography_p_6.1.5.060

Description: IPP密码学函数范例,用VC++编译,欢迎学习-IPP cryptography functions example, using VC++ compiler, welcomed the study
Platform: | Size: 296960 | Author: Louis Fu | Hits:

[JSP/JavaCryptography

Description: It contains the examples from Java Cryptography book
Platform: | Size: 62464 | Author: m | Hits:

[Crack HackCryptography

Description: 计算机密码学 经典密码学书籍,含很多算法的标准实现代码-Cryptography book including many standard codes for some cryptographic algorithms. recommended.
Platform: | Size: 8806400 | Author: 刘兰 | Hits:

[Crack HackIntroduction_to_modern_cryptography

Description: introduction to modern cryptography
Platform: | Size: 1442816 | Author: bharath pasham | Hits:

[Crack Hackcryptography

Description: 网络安全中的几种重要的加密算法, CBC,CFB, message digest, etc.-important cryptography algorithm in network security, like CBC, CFB, message digest, etc.
Platform: | Size: 7168 | Author: Hechen Liu | Hits:

[matlabVisual_Cryptography

Description: visual cryptography is very important for encryption of the data like images.
Platform: | Size: 91136 | Author: sanjay | Hits:

[OtherCryptography

Description: Nigel Smart An Introduction to Cryptography 2007 pdf 电子版(非扫描)-Nigel Smart An Introduction to Cryptography 2007 pdf electronic version of the (non-scanning)
Platform: | Size: 2108416 | Author: roy | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 50 »

CodeBus www.codebus.net