Welcome![Sign In][Sign Up]
Location:
Search - public key

Search list

[Crack HackRSA_Prog

Description: rsa数字签名公钥加密私钥解密c++源代码-The C++ source program of RSA digital signature about encryption with public key and decryption with secret key.
Platform: | Size: 5120 | Author: 冉冉 | Hits:

[Crack Hack公钥加密算法

Description: rsa加密解密是一种公钥加密算法,广泛应用于信息安全领域-rsa encryption and decryption is a public key encryption algorithm widely used in the field of information security
Platform: | Size: 8192 | Author: 张震 | Hits:

[SQL Serverstudentinfo

Description: 学生信息管理系统(JBuilder x 开发,采用RSA 512位公钥加密,私钥用于找回密码,2006-4-5)-student information management system (x JBuilder development, adoption 512 RSA public key encryption, the private key used to retrieve passwords 2006-2007-4- 5)
Platform: | Size: 1847296 | Author: zy | Hits:

[Grid ComputingPKIDigitalCertificate

Description: 有关公钥基础设施数字证书的签名及认证。有详尽的注释,代码分发送者和接受者两部分。-the public key infrastructure digital certificate authentication and signatures. Details on the Notes, code-sender and the recipient of two parts.
Platform: | Size: 2048 | Author: lin | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[Crack HackRSA

Description: RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名。本程序提供了RSA加密和解密过程实现的源代码。-RSA public key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, digital signatures can also be used. This procedure provides the RSA encryption and decryption process of the realization of the source code.
Platform: | Size: 663552 | Author: 严玉洁 | Hits:

[Technology ManagementNET

Description: The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
Platform: | Size: 11264 | Author: 士大夫 | Hits:

[CA authSimplifyingPublicKeyManagement

Description: PKI(public key infrastructure) and CA(certificate authority)
Platform: | Size: 270336 | Author: carll | Hits:

[CA authRSA

Description: :RSA 是最广泛的公钥算法,从程序实现的主要思想、算法分析及流程说明、实验环境要求描述、运行 和结果、运行效率分析和程序源代码六方面介绍运用java程序实现RSA加密算法,要求输入明文的二进制位数 不少于1024。-: RSA public key is the most widely algorithm, from the process to achieve the main ideas, algorithms and processes that describe the experimental environmental requirements, operation and results, operational efficiency analysis and source code six introduce the use of java program RSA encryption algorithm, expressly asked to enter the binary digits of not less than 1024.
Platform: | Size: 160768 | Author: 王功臣 | Hits:

[Crack Hackjava_encrypt_decrypt

Description: 1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
Platform: | Size: 17408 | Author: 张海滨 | Hits:

[Crack HackRSA

Description: RSA算法是在1978年由Ron Rivest, AdiShamir 和Leonard Adleman提出的一种公钥加密算法。RSA能同时用于加密和数字签名的算法,也易于理解和操作。RSA是被广泛研究的公钥算法,从提出至今,经历了各种攻击的考验,逐渐为人们所接受,被普遍认为是目前最优秀的公钥方案之一。-RSA algorithm in 1978 by Ron Rivest, AdiShamir and Leonard Adleman proposed a public key encryption algorithm. RSA can be used for both encryption and digital signature algorithms, but also easy to understand and operate. RSA has been extensively studied is the public key algorithm, from the present, has undergone the test of various attacks, and gradually accepted, is generally considered the best public-key is currently one of the options.
Platform: | Size: 1024 | Author: | Hits:

[VC/MFCElGamal

Description:  ElGamal算法既能用于数据加密也能用于数字签名,其安全性依赖于计算有限域上离散对数这一难题。 密钥对产生办法。首先选择一个素数p,两个随机数, g 和x,g, x < p, 计算 y = g^x ( mod p ),则其公钥为 y, g 和p。私钥是x。g和p可由一组用户共享。 ElGamal用于数字签名。被签信息为M,首先选择一个-ElGamal algorithm not only used for data encryption can be used for digital signatures, their safety depends on the calculation of a finite field discrete logarithm this problem. Key to the method. First of all, choose a prime number p, the two random numbers, g and x, g, x <p, computing y = g ^ x (mod p), for its public key y, g and p. Private key is x. g and p by a group of users to share. ElGamal for digital signatures. Information was signed M, first choose a
Platform: | Size: 1024 | Author: 修凤志 | Hits:

[Crack Hackecp

Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(p)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (p) the algorithm
Platform: | Size: 5120 | Author: che wang | Hits:

[Crack Hackec2n

Description: 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(2^n)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (2 ^ n) the algorithm
Platform: | Size: 3072 | Author: che wang | Hits:

[Windows Developpublic-key

Description: using public Decrypt and Encrypt message. just basic introduction how to dencrypt and decrypt.
Platform: | Size: 67584 | Author: david | Hits:

[VOIP programSIP10

Description: 分析了会话发起协议及其特点,指出了SIP网络面临的一些典型攻击和安全威胁,并针 对SIP网络面临的安全风险提出了基于PKI公钥基础设施的SIP协议安全的解决方案,完善 了SIP的安全机制,使SIP能进一步为用户提供更加多样、安全的服务。-Analysis of the Session Initiation Protocol and its characteristics, pointing out that the SIP network is facing some of the typical attacks and security threats, and SIP networks for security risks faced by PKI based on public key infrastructure of the SIP protocol security solutions, improved the SIP- security mechanism, so that SIP will further provide users with a more diverse, security services.
Platform: | Size: 203776 | Author: 王名 | Hits:

[matlabRSA-public-key-cryptosystem

Description: RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
Platform: | Size: 1024 | Author: xiaotiantian | Hits:

[Linux-UnixElGamal

Description: Implementation Of ELGAMAL Public key encryption in C . it can use very long key os size 2007 decimal digit.
Platform: | Size: 65536 | Author: vinay | Hits:

[CA authpublic_key_algorithm

Description: this source code of public key-this is source code of public key
Platform: | Size: 24576 | Author: temndul | Hits:

[Windows DevelopPublic-key-infra-.tcl

Description: it is publickey infrastructure in wireless network, it generates a public key and a private key for mobile nodes-it is publickey infrastructure in wireless network, it generates a public key and a private key for mobile nodes
Platform: | Size: 2048 | Author: Dinesh444 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 37 »

CodeBus www.codebus.net