Welcome![Sign In][Sign Up]
Location:
Search - dh

Search list

[Program docdh123456

Description: DH算法的相关资料是一种不对称加密算法,希望对相关者有所帮助-DH relevant information on the algorithm is an asymmetric encryption algorithm, and I hope to help stakeholders
Platform: | Size: 24576 | Author: 赵永海 | Hits:

[Software Engineeringdh

Description: flash导航条,可以用FLASHMX自行加减-flash navigation bar, you can use their own addition and subtraction FlashMX
Platform: | Size: 19456 | Author: 7758521 | Hits:

[Crack Hackbeeo

Description: 基于beeo标准的数据加解密算法,包括md5、dh等基础算法-Beeo standards-based data encryption and decryption algorithms, including md5, dh basic algorithm
Platform: | Size: 30720 | Author: 靳晓辉 | Hits:

[Windows DevelopDiffieHellmanExample_demo

Description: DH算法是W.Diffie和M.Hellman提出的。此算法是最早的公钥算法。它实质是一个通信双方进行密钥协定的协议:两个实体中的任何一个使用自己的私钥和另一实体的公钥,得到一个对称密钥,这一对称密钥其它实体都计算不出来。-DH algorithm is W. Diffie and M. Hellman proposed. This algorithm is one of the first public key algorithm. It is essentially a communication two key agreements: the two entities in any one to use their own private key and another entity
Platform: | Size: 576512 | Author: 杨鹏翼 | Hits:

[matlabdh

Description:
Platform: | Size: 362496 | Author: stephen | Hits:

[Mathimatics-Numerical algorithmsDH

Description: DH简单的密钥交换,暂时不支持大数运算,MFC编译后的-Simple DH key exchange, do not support the operation of large numbers, MFC compiled
Platform: | Size: 2048 | Author: 陈力 | Hits:

[Crack HackDH

Description: Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm Step 3: Use UDP to exchange DH public key Step 4: Establish an AES‐256 encrypted channel using UDP and deliver one encrypted file Step 5: Establish an AES‐256 encrypted channel using TCP and deliver one encrypted file -Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm Step 3: Use UDP to exchange DH public key Step 4: Establish an AES‐256 encrypted channel using UDP and deliver one encrypted file Step 5: Establish an AES‐256 encrypted channel using TCP and deliver one encrypted file
Platform: | Size: 128000 | Author: Tong Liu | Hits:

[Video CaptureDH-HVDevice

Description: 某家公司的数字摄像机视频采集全部示例程序源码 -All of a company' s video capture sample program source code
Platform: | Size: 48573440 | Author: 孙希杰 | Hits:

[Crack HackDH

Description: 这是DH密钥交换的实现实例源代码,用VS2008所写,希望能给新手一点启发。-This is a DH key exchange the realization of an instance of source code, written with VS2008, hoping to give novice some inspiration.
Platform: | Size: 151552 | Author: Weberte | Hits:

[Crack Hackcryptopp560

Description: 最新Crypto++5.6版 加密解密函数类库。C++版。完美支持Visual Studio 2008,2005,2003,2002,6.0,C++ Builder 2009,GCC等主流编译器。 -Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 1048576 | Author: 沧海 | Hits:

[Windows DevelopDiffie-Hellman-Key-Exchange-Example

Description: DH密钥交换协议实现,完成建立相同密钥的过程-key exchange protocol implement
Platform: | Size: 2589696 | Author: runyeo | Hits:

[Windows DevelopDH-CG300QP300CG320

Description: 大恒采集卡的dll和手册,包括实例,欢迎下载。-Daheng capture card dll and manuals, including examples, are welcome to download.
Platform: | Size: 2159616 | Author: 邓宏平 | Hits:

[Software EngineeringDH-DTR2.0

Description: 说明: 本程序用于 GPS 原始数据的批量格式转换(DSNP 到 RINEX 格式)。 程序需要原版的 DTR 程序,它在“Call”目录下。如果您的计算机上已经安装了原版本的 DTR 3.30 或 3SPack 3.20 那么 Call 目录下的文件就不需要了。-Description: This program for GPS data batch convert (DSNP to RINEX format). The original application needs, it in "program DTR Call" directory. If your computer has been installed the original version of the DTR 3.30 or 3SPack 3.20 so Call list of files are not needed.
Platform: | Size: 292864 | Author: kzuan | Hits:

[Linux-UnixDH_with_gmp.tar

Description: simple c source code for the DH algorithme
Platform: | Size: 1024 | Author: allenremi | Hits:

[GDI-Bitmapdh

Description: OpenGL动画编程。用窗口初始化函数,窗口处理和事件处理函数,定义场景绘制循环函数,三维物体绘制函数,空闲事件处理函数等来进行书写程序-OpenGL animation programming. Initialization function with the window, window treatment and event handlers, custom scene rendering loop function, three-dimensional object drawing functions, such as idle event handler to be written procedures
Platform: | Size: 2048 | Author: 肖旖旎 | Hits:

[Crack HackMFC

Description: 集中了各种加密算法 如RSA DH playfair keyword 等常用加密算法 用MFC做出了界面软件-It‘s a good software about cypher
Platform: | Size: 17338368 | Author: 陈中 | Hits:

[Crack HackDH-key-exchange-algorithm

Description: DH密钥交换算法,适用于网络环境的密钥交换,隶属于公钥-DH key exchange algorithm
Platform: | Size: 5120 | Author: Jason | Hits:

[Windows DevelopDH-Multiplication

Description: DH mulitplication formula written in visual C-DH mulitplication formula written in visual C++
Platform: | Size: 568320 | Author: khalil | Hits:

[Crack HackDH

Description: 双机加解密,DH密钥交换系统,源码即可执行文件-Double encryption, DH key exchange system, the source file can be executed
Platform: | Size: 4608000 | Author: 于明月 | Hits:

[Crack HackDH-Key-Exchange

Description: 通过本程序 你可以更好的理解Diffie-Hellman 密钥交换算法 当然也能将该程序应用到网络安全的编程当中去-Through this program you can better understand the Diffie-Hellman key exchange algorithm is of course the program can also be applied to network security, programming them to
Platform: | Size: 288768 | Author: qwerty | Hits:
« 12 3 4 5 6 7 8 9 10 ... 13 »

CodeBus www.codebus.net