Welcome![Sign In][Sign Up]
Location:
Search - public key cryptography

Search list

[Other resourcemimaxue_ppt

Description: 非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002 - 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Platform: | Size: 3093417 | Author: 孟繁宇 | Hits:

[Crack HackNTL-RSA

Description: 使用NTL大整数库实现RSA公钥密码算法,可用于对文本文件进行加密和解密. 平台Windows98以上,VC++6.0, 内部文件路径均为相对路径,不存在无法编译的Bub.-use of the NTL large integer achieve RSA public key cryptography algorithm, can be used to text file encryption and decryption. Windows98 platform above, VC 6.0, trails are internal documents relative path, we can not compile Bub.
Platform: | Size: 1917069 | Author: 李刚 | Hits:

[Crack HackRSA_Prog

Description: rsa数字签名公钥加密私钥解密c++源代码-The C++ source program of RSA digital signature about encryption with public key and decryption with secret key.
Platform: | Size: 5120 | Author: 冉冉 | Hits:

[Othermimaxue_ppt

Description: 非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002- 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Platform: | Size: 3093504 | Author: 孟繁宇 | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[Crack HackDownRSA

Description: RSA加密算法java代码,自动生成公钥和密钥-RSA encryption algorithm java code, automatic generation public key cryptography
Platform: | Size: 8192 | Author: sikyZhao | Hits:

[Crack Hack99-GuTingTing-RSA

Description: RSA算法是一种公钥密码算法.实现RSA算法包括生成RSA密钥,用RSA加密规则和解密规则处理数据。RSA数字签名算法利用RSA算法实现数字签名。本文详述了RSA算法的基本原理, RSA加密算法的实现以及如何利用RSA实现数字签名.-RSA is a public key cryptography algorithm. Implementation of RSA algorithm include RSA key generation. using RSA encryption and decryption rules rules processing data. RSA digital signature algorithm uses RSA Digital Signature Algorithm. The paper describes how the RSA algorithm to the basic principles RSA encryption algorithm and the realization of how to use RSA digital signature.
Platform: | Size: 19456 | Author: huke | Hits:

[Crack Hackjava_encrypt_decrypt

Description: 1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Platform: | Size: 17408 | Author: 张海滨 | Hits:

[Crack Hackmiracl

Description: 大数运算库miracl。有了miracl这样的函数库,你可以直接调用函数,来实现你要的公钥密码学的某个功能。-Treasury computing large numbers miracl. With miracl this library, you can directly call the function, to realize that you ask for a public-key cryptography functions.
Platform: | Size: 1295360 | Author: Michael Lee | Hits:

[Crack Hackecp

Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(p)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (p) the algorithm
Platform: | Size: 5120 | Author: che wang | Hits:

[Crack Hackec2n

Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(2^n)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (2 ^ n) the algorithm
Platform: | Size: 3072 | Author: che wang | Hits:

[matlabRSA-public-key-cryptosystem

Description: RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
Platform: | Size: 1024 | Author: xiaotiantian | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Crack Hackcrypt

Description: 密码学实验平台,完整独立运行VC6.0 源程序,包含对称密码学和公钥密码学的主要算法。-Cryptography experimental platform, a complete stand-alone source of VC6.0, including the main algorithm of symmetric cryptography and public key cryptography.
Platform: | Size: 155648 | Author: zhou | Hits:

[CA authRSA

Description: RSA-is an algorithm for public-key cryptography-RSA-is an algorithm for public-key cryptography
Platform: | Size: 6144 | Author: andrushkutzzaa | Hits:

[Crack Hacksm2-alg

Description: SM2椭圆曲线公钥密码算法,SM2椭圆曲线公钥密码算法推荐曲线参数-Elliptic curve public key cryptography algorithm SM2, SM2 recommended elliptic curve public key cryptography algorithm curve parameters
Platform: | Size: 876544 | Author: he | Hits:

[Crack HackPublic-key-Cryptography

Description: The mechanisms and methods of operation of public key encryption.
Platform: | Size: 13312 | Author: william | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack Hacklattice_processor

Description: C++ 实现格公钥密码, 包括LWE困难问题。(implementation of lattice public key cryptography)
Platform: | Size: 15775744 | Author: 密码爱好者 | Hits:

[OtherPublic-Key Cryptography_Eng

Description: Public-Key Cryptography
Platform: | Size: 985088 | Author: Nabil | Hits:
« 12 3 4 5 6 7 8 »

CodeBus www.codebus.net