Location:
Search - rc6 encryption
Search list
Description: 300种加密解密算法.包含RSA、SHA、MD5、RC2、RC5、RC6等等。-300 encryption and decryption algorithms. Includes RSA, SHA, MD5, RC2, RC5, RC6, and so on.
Platform: |
Size: 334440 |
Author: snail |
Hits:
Description: rc6 加密解密算法-production encryption and decryption algorithm
Platform: |
Size: 5943 |
Author: 王亮 |
Hits:
Description: RC5-RC6 Base加密-解密源码 ,用途是:网络通讯加密。两种版本- This is the RC5-RC6 Base encryption-decryption source code which can be used in net communication encryption.IT has two editon.
Platform: |
Size: 5773 |
Author: exc |
Hits:
Description: 内核加解密算法 加解密函数库及其使用说明,详见附件。 find_cipher_by_name中参数ciphername可取的值为下面的组合,对应不同的模式: (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-ecb (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-cbc (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc6,serpent,twofish)-cfb struct cipher_implementation* ci中对应的可调用的method:encrypt_iv decrypt_iv encrypt decrypt 比如以des-cbc为find_cipher_by_name的参数得到的ci调用encrypt_iv,decrypt_iv. find_digest_by_name中参数digestname可取的值: sha1 md5 struct digest_implementation* di中对应的可调用的method:open update digest close hmac 计算digest时调用di->digest,计算hmac时调用di->hmac. 注意:加载我们需要的cipher-*.o和digest-*.o之前需先加载cryptoapi.o。 -core encryption and decryption algorithm encryption and decryption functions and their use, as detailed in the annex. Find_cipher_by_name cipher desirable parameter values to the following portfolio, dealing with different modes : (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish)- ecb ( des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish)- cbc (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, production, the serpent , twofish)- Sample struct cipher_implementation ci* corresponding the available method : encrypt_iv decrypt_iv encrypt decrypt such as a des-cbc find_cipher_by_name parameters for the ci call encrypt_iv, decrypt_iv. find_digest_by_name digestname desirable parameter values : sha1 md
Platform: |
Size: 139264 |
Author: xf |
Hits:
Description: a C++ Class Library of Cryptographic Primitives
This library includes:
MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES,
IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC,
various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA,
NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser,
elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: |
Size: 388096 |
Author: 刘永 |
Hits:
Description: Encryption Efficiency Analysis and Security
Evaluation of RC6 Block Cipher for Digital
Images
Platform: |
Size: 454656 |
Author: Ariunchimeg |
Hits:
Description: Wireless Sensor Networks (WSN) are becoming popular day by day,
however one of the main issue in WSN is its limited resources. We
have to look to the resources to create Message Authentication Code
(MAC) keeping in mind the feasibility of technique used for the
sensor network at hand. This research work investigates different
cryptographic techniques such as symmetric key cryptography and
asymmetric key cryptography. Furthermore, it compares different
encryption techniques such as stream cipher (RC4), block cipher
(RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5,
SHA, SHA1 etc). The result of our work provides efficient
techniques for communicating device, by selecting different
comparison matrices i.e. energy consumption, processing time,
memory and expenses that satisfies both the security and restricted
resources in WSN environment to create MAC.
Platform: |
Size: 747520 |
Author: zu |
Hits:
Description: 单片机加密算法,包括AES,DES,MD5,RC6,RSA等(SCM encryption algorithm, including AES, DES, MD5, RC6, RSA and so on)
Platform: |
Size: 15360 |
Author: xyharm
|
Hits:
Description: [rc] Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers
[rc5] RC5 Image encryption in matlab
[Raji-mam] image compression and encryption
Platform: |
Size: 122880 |
Author: ramanraj021 |
Hits:
Description: Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers
image compression and encryption
Platform: |
Size: 965632 |
Author: ramanraj021 |
Hits:
Description: [rc] Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers
[rc5] RC5 Image encryption in matlab
[Raji-mam] image compression and encryption
Platform: |
Size: 61440 |
Author: ramanraj021 |
Hits: