Welcome![Sign In][Sign Up]
Location:
Search - cryptosystem

Search list

[Other1. A block cipher cryptosystem using wavelet tran

Description: 在现在信息的安全性得到了重视,水印技术在信息隐藏中是一种新的方法。这篇文章能够帮助我们理解水印技术。-now information security has been the focus of attention, watermark technology in the Information Hiding is a new approach. This article can help us to understand watermarking technology.
Platform: | Size: 535329 | Author: 王清华 | Hits:

[Crack Hackpgp262

Description: PGP 是一种混合密码系统。当用户使用PGP 来对纯文字加密的时候, PGP 首先会压缩这 段纯文字。数据压缩能够节省调制解调器传输时间以及磁盘类空间,还有更重要的、强化密码法的 保密程度。-PGP is a hybrid cryptosystem. When the user to use PGP to encrypt the text, PGP will first this text compression. Data compression can save time and modem transmission disk space, and more importantly, to strengthen the password confidentiality law.
Platform: | Size: 283099 | Author: 刘二 | Hits:

[Crack HackHillCodor

Description: 在VC环境下采用希尔密码体制加密、解密和破译。该软件实现了输入任意长度的密钥对文件进行加密和解密,解密密钥和密文保存在文件中。如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。-in VC environment with Hill cryptosystem encryption, decryption and decoding. The software arbitrary length of the input to the key document encryption and decryption, and the decryption key secret to preserve the text in the document. If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.
Platform: | Size: 42819 | Author: | Hits:

[Other resourceshamir ID

Description: 介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem -- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.
Platform: | Size: 279583 | Author: 张进 | Hits:

[Web Serverpowerrmv

Description: RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名,-RSA public-key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, can also be used for digital signatures,
Platform: | Size: 110549 | Author: 刘浪 | Hits:

[Search EngineNTRU-1

Description: NTRU公钥密码体制的环积实现代码,这个只是一个最基础的实现,-NTRU public key cryptosystem Central plot achieve code, the only one to achieve the most basic,
Platform: | Size: 8120 | Author: 丝亚 | Hits:

[Crack HackhybridDESRSA

Description: 东北大学编写的DES、RSA混合密码系统,完整可用。-prepared by the Northeastern University DES, RSA cryptosystem mixed, integrity available.
Platform: | Size: 277378 | Author: 周艺红 | Hits:

[Crack Hackfdcmm

Description: 非对称密码的简单实现 毕业设计的-asymmetric cryptosystem to achieve a simple design of graduation .......................
Platform: | Size: 78713 | Author: anthony | Hits:

[Crack Hackaes

Description: This is an implentation of the RIJNDAEL cryptosystem.
Platform: | Size: 2804 | Author: zhenshanhong | Hits:

[Crack Hackibe-0.7

Description: 斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
Platform: | Size: 99067 | Author: 周渊 | Hits:

[Crack Hack2745ECC

Description: 椭圆曲线加密算法-elliptic curve cryptosystem
Platform: | Size: 17607 | Author: liye | Hits:

[Internet-Networkibe-0.7.2

Description: 这是一个unix环境下实现基于身份的PKI系统源码,由stanford大学开发。采用了椭圆曲线密码公钥系统和配对椭圆曲线计算(Tate Pairing),具有非常高的效率.-This is a Unix-based environment PKI identity of the source system, developed by Stanford University. Use of Elliptic Curve Cryptosystem matching public key systems and elliptic curve calculation (Tate Pairing), with a very high efficiency.
Platform: | Size: 83508 | Author: 叶润国 | Hits:

[Crack HackRSA

Description: RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名。本程序提供了RSA加密和解密过程实现的源代码。-RSA public key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, digital signatures can also be used. This procedure provides the RSA encryption and decryption process of the realization of the source code.
Platform: | Size: 663552 | Author: 严玉洁 | Hits:

[OtherRabin_Cryptosystem

Description: 我的毕业论文及调研报告:《大模数的Rabin密码保密通信软件》 本文对Rabin密码保密通信软件进行了研究。简单介绍了信息安全技术现状及研究意义,讨论了公钥密码系统和Rabin密码系统及其涉及到的算法,包括大整数的实现、蒙格马利快速幂模运算、Miller-Rabin素性检测法、扩展的欧几里德算法。着重讨论了Rabin密码系统的方案设计以及Winsock通信技术。最后讲解了Rabin密码系统在保密通信中的应用,初步完成了大模数Rabin密码保密通信软件的设计。-My thesis and research report: Great modulus Rabin password secure communication software In this paper, Rabin password confidential communication software were studied. A brief introduction of the information security technology and research significance of the status quo, to discuss public-key cryptosystem and Rabin cryptosystem and involved in the algorithm, including the realization of large integers, Montgomery rapid computing power mode, Miller-Rabin primality test, Extended Euclidean algorithm. Focused on the Rabin cryptosystem Winsock program design and communication technologies. Finally on the Rabin cryptosystem secure communication applications, the initial completion of a large modulus Rabin password confidential communication software design.
Platform: | Size: 883712 | Author: 周金月 | Hits:

[matlabRSA-public-key-cryptosystem

Description: RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
Platform: | Size: 1024 | Author: xiaotiantian | Hits:

[Crack HackAnImageEncryptionSchemeBasedonChaoticMap

Description: ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security cryptosystem.
Platform: | Size: 1104896 | Author: ff | Hits:

[Software EngineeringA-novel-cryptosystem-based-on-grey-system-theory-

Description: A novel cryptosystem based on grey system theory and genetic algorithm
Platform: | Size: 135168 | Author: said | Hits:

[Crack HackcriptosistemaFinal

Description: color image cryptosystem
Platform: | Size: 505856 | Author: cs1400 | Hits:

[Crack Hackspatio

Description: Cryptanalysis of a spatiotemporal chaotic cryptosystem
Platform: | Size: 610304 | Author: cs1400 | Hits:

[Crack HackMulti

Description: Cryptanalysis of a multi-chaotic systems based image cryptosystem
Platform: | Size: 136192 | Author: cs1400 | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net