Welcome![Sign In][Sign Up]
Location:
Search - rc6 encryption

Search list

[Other resource300

Description: 300种加密解密算法.包含RSA、SHA、MD5、RC2、RC5、RC6等等。-300 encryption and decryption algorithms. Includes RSA, SHA, MD5, RC2, RC5, RC6, and so on.
Platform: | Size: 334440 | Author: snail | Hits:

[Crack HackRC5RC6 Base加密解密源码c++

Description: rc6 加密解密算法-production encryption and decryption algorithm
Platform: | Size: 5943 | Author: 王亮 | Hits:

[CA authbase

Description: RC5-RC6 Base加密-解密源码 ,用途是:网络通讯加密。两种版本- This is the RC5-RC6 Base encryption-decryption source code which can be used in net communication encryption.IT has two editon.
Platform: | Size: 5773 | Author: exc | Hits:

[OS programkenel_crypto

Description: 内核加解密算法 加解密函数库及其使用说明,详见附件。 find_cipher_by_name中参数ciphername可取的值为下面的组合,对应不同的模式: (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-ecb (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc5,rc6,serpent,twofish)-cbc (des,des_ede3,aes,blowfish,cast5,dfc,idea,mars,rc6,serpent,twofish)-cfb struct cipher_implementation* ci中对应的可调用的method:encrypt_iv decrypt_iv encrypt decrypt 比如以des-cbc为find_cipher_by_name的参数得到的ci调用encrypt_iv,decrypt_iv. find_digest_by_name中参数digestname可取的值: sha1 md5 struct digest_implementation* di中对应的可调用的method:open update digest close hmac 计算digest时调用di->digest,计算hmac时调用di->hmac. 注意:加载我们需要的cipher-*.o和digest-*.o之前需先加载cryptoapi.o。 -core encryption and decryption algorithm encryption and decryption functions and their use, as detailed in the annex. Find_cipher_by_name cipher desirable parameter values to the following portfolio, dealing with different modes : (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish)- ecb ( des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, RC5, production, serpent, twofish)- cbc (des, des_ede3, Aes, blowfish, cast5, DFC, the idea, mars, production, the serpent , twofish)- Sample struct cipher_implementation ci* corresponding the available method : encrypt_iv decrypt_iv encrypt decrypt such as a des-cbc find_cipher_by_name parameters for the ci call encrypt_iv, decrypt_iv. find_digest_by_name digestname desirable parameter values : sha1 md
Platform: | Size: 139264 | Author: xf | Hits:

[OS programLibrary_of_Cryptographic

Description: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: | Size: 388096 | Author: 刘永 | Hits:

[Crack Hackv1-1-5-10

Description: Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Platform: | Size: 454656 | Author: Ariunchimeg | Hits:

[Program docComparison-Based-Analysis-of-Different-Cryptograp

Description: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
Platform: | Size: 747520 | Author: zu | Hits:

[Other加密算法源码

Description: 单片机加密算法,包括AES,DES,MD5,RC6,RSA等(SCM encryption algorithm, including AES, DES, MD5, RC6, RSA and so on)
Platform: | Size: 15360 | Author: xyharm | Hits:

[Crack HackHexEnc_demo

Description: [rc] Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers [rc5] RC5 Image encryption in matlab [Raji-mam] image compression and encryption
Platform: | Size: 122880 | Author: ramanraj021 | Hits:

[SCMhacker-detection-in-wireless-pr

Description: Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers image compression and encryption
Platform: | Size: 965632 | Author: ramanraj021 | Hits:

[Otherajm232_code_201105161112

Description: [rc] Includes rc2, rc4, rc5, rc6 the algorithm rc algorithm gathers [rc5] RC5 Image encryption in matlab [Raji-mam] image compression and encryption
Platform: | Size: 61440 | Author: ramanraj021 | Hits:
« 1 2 3»

CodeBus www.codebus.net