Welcome![Sign In][Sign Up]
Location:
Search - ecdh

Search list

[Internet-NetworkECDSAECDH

Description: 无线局域网产品采用的ECDSA和ECDH密码算法椭圆曲线和参数
Platform: | Size: 111456 | Author: green | Hits:

[Crack Hackellipt2d-1.8

Description: 椭圆曲线加密ECC源代码,使用c++编写。转sourceforge-Elliptic Curve Cryptography ECC source code, the use of c++ Prepared. To sourceforge
Platform: | Size: 1234944 | Author: xcr | Hits:

[Internet-NetworkECDSAECDH

Description: 无线局域网产品采用的ECDSA和ECDH密码算法椭圆曲线和参数-Wireless LAN Products ECDH used ECDSA and Elliptic Curve Cryptography and parameters
Platform: | Size: 111616 | Author: green | Hits:

[Crack Hackcryptopp560

Description: 最新Crypto++5.6版 加密解密函数类库。C++版。完美支持Visual Studio 2008,2005,2003,2002,6.0,C++ Builder 2009,GCC等主流编译器。 -Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 1048576 | Author: 沧海 | Hits:

[Windows DevelopCryptoPPRef

Description: 著名超强加密解密函数类库Crypto++的最新Reference参考资料。官方的超全!-Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 6827008 | Author: 沧海 | Hits:

[Windows DevelopCryptoPPGuide

Description: Crypto++的文档,虽然不是很全,但是其中有简单的调用该类库的方法实例。-Abstract Base Classes cryptlib.h Authenticated Encryption AuthenticatedSymmetricCipherDocumentation Symmetric Ciphers SymmetricCipherDocumentation Hash Functions SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, Whirlpool, RIPEMD160, RIPEMD320, RIPEMD128, RIPEMD256, Weak1::MD2, Weak1::MD4, Weak1::MD5 Non-Cryptographic Checksums CRC32, Adler32 Message Authentication Codes VMAC, HMAC, CBC_MAC, CMAC, DMAC, TTMAC, GCM (GMAC) Random Number Generators NullRNG(), LC_RNG, RandomPool, BlockingRng, NonblockingRng, AutoSeededRandomPool, AutoSeededX917RNG, DefaultAutoSeededRNG Password-based Cryptography PasswordBasedKeyDerivationFunction Public Key Cryptosystems DLIES, ECIES, LUCES, RSAES, RabinES, LUC_IES Public Key Signature Schemes DSA, GDSA, ECDSA, NR, ECNR, LUCSS, RSASS, RSASS_ISO, RabinSS, RWSS, ESIGN Key Agreement DH, DH2, MQV, ECDH, ECMQV, XTR_DH Algebraic Structures Integer, PolynomialMod2, PolynomialOver, RingOfPolynomialsOver, ModularArithmetic, MontgomeryRepresentati
Platform: | Size: 79872 | Author: 沧海 | Hits:

[WEB CodeEllipticCurve

Description: ecdh description in html
Platform: | Size: 2048 | Author: robaqs | Hits:

[Crack HackBasicECDHExample

Description: A Basic ECDH source code in Java
Platform: | Size: 1024 | Author: Yohan | Hits:

[Crack Hacktinypkc

Description: TinyPKC performs assymmetric cryptography for TinyOS 2.x based on the original implementation in CyaSSL (http://www.yassl.com/yaSSL/Products-cyassl.html). It offers support for the following operations: - RSA public key encryption / private key decryption - RSA private key signature generation / public key signature verification - ECDSA signature generation and verification - ECDH operations-TinyPKC performs assymmetric cryptography for TinyOS 2.x based on the original implementation in CyaSSL (http://www.yassl.com/yaSSL/Products-cyassl.html). It offers support for the following operations: - RSA public key encryption / private key decryption - RSA private key signature generation / public key signature verification - ECDSA signature generation and verification - ECDH operations
Platform: | Size: 68608 | Author: FR | Hits:

[CA authEcdh-agree

Description: DH-EKE源代码,密钥交换算法的C++实现-DH-EKE algorithm source code
Platform: | Size: 8192 | Author: dlh | Hits:

[Linux-Unixio

Description: The ECDH software is originally written by Douglas Stebila of Sun Microsystems Laboratories.
Platform: | Size: 12288 | Author: kxpwbw | Hits:

CodeBus www.codebus.net