Welcome![Sign In][Sign Up]
Location:
Search - secret sharing

Search list

[OS programLibrary_of_Cryptographic

Description: a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.-a C++ Class Library of Cryptographic Primitives This library includes: MD2, MD5, SHA-1, HAVAL, Tiger, RIPE-MD160, MD5-MAC, HMAC, XOR-MAC, DES, IDEA, WAKE, 3-WAY, TEA, SAFER, Blowfish, SHARK, GOST, CAST-128, Square,Diamond2, Sapphire, RC2, RC5, RC6, MARS, SEAL, Luby-Rackoff, MDC, various encryption modes (CFB, CBC, OFB, counter), DH, DH2, MQV, DSA, NR, ElGamal, LUC, LUCDIF, LUCELG, Rabin, RW, RSA, BlumGoldwasser, elliptic curve cryptosystems, BBS, DEFLATE compression,Shamir s secret sharing scheme, Rabin s information dispersal scheme.
Platform: | Size: 388096 | Author: 刘永 | Hits:

[Otherhowtosharesecret

Description: shamir的秘密分享机制的原文。秘密分享门限机制中,利用拉格朗日插值多项式来恢复。-shamir secret-sharing mechanism in the original language. Threshold secret sharing mechanism, the use of Lagrange polynomial interpolation to restore.
Platform: | Size: 184320 | Author: 黄海凌 | Hits:

[Crack Hacksecretshare_VC++

Description: Shamir秘密分享与恢复算法的VC++程序,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再得出主密钥。输入大数长度和份数可自行定义(默认是270位和不超过20份)。-Shamir secret sharing and recovery algorithm VC procedures, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then come to the main key. Length and the importation of large numbers of shares to be defined (the default is 270 and not more than 20).
Platform: | Size: 1963008 | Author: linvg | Hits:

[Crack Hacksecretshare_java

Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 5120 | Author: linvg | Hits:

[Windows Developsrc

Description: shamir‘s secret sharing C语言源码,对密码分割合并实现秘密共享-shamir' s secret sharing C language source code for the password secret sharing to achieve the combined partition
Platform: | Size: 245760 | Author: iuhiuh | Hits:

[GDI-Bitmapsharing_Thien

Description: 实现了Thien在他的文章《secret image sharing》中提出的(r,n)门限秘密图像分存方案。-this program has relized the (r, n) threshold secret image sharing scheme that was proposed by Thien in his paper《secret image sharing》
Platform: | Size: 967680 | Author: 陈高 | Hits:

[Other systemsSecretSharing

Description: Secret Sharing By Seth Rogers
Platform: | Size: 185344 | Author: sweetu | Hits:

[JSP/JavaSFSClient

Description: Secret File Sharing Scheme-Secret File Sharing Scheme..
Platform: | Size: 2016256 | Author: Gokul | Hits:

[Crack HackShamir

Description: Shamir秘密分享算法的C#实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 2179072 | Author: | Hits:

[CA authAsmuth_Bloom

Description: Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. Asmuth-Bloom s threshold secret sharing scheme.-Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. Asmuth-Bloom s threshold secret sharing scheme.
Platform: | Size: 320512 | Author: monica1987is | Hits:

[JSP/Java20100212

Description: verifiable secret sharing of images using watrmarking
Platform: | Size: 285696 | Author: prashanth | Hits:

[Othermulti-secret-sharing-code

Description: 多秘密共享代码 ,包含四个模型的实现。代码用c++编写,用vs2008做平台。-Multi-secret sharing code, including the realization of the four models.
Platform: | Size: 9735168 | Author: wangyanxi | Hits:

[Crack HackSecret-Image-Sharing

Description: 研究秘密图像分享技术,利用秘密图像分享技术来实现加密。-How to Share a Secret.using Secret Image Sharing.
Platform: | Size: 633856 | Author: rustle | Hits:

[Crack Hacksecret-sharing-scheme

Description: :利用椭圆曲线密码算法设计了一个新的1"3限多重秘密分享方案,该方案的特点是不需要秘密分发者事先给每个用户分发 一个子秘密.不需要安全信道传输信息,而且所有的中间信息都是不需要保密的-This paper proposes a new threshold multi-secret sharing scheme which is based on ECC.Th e scheme didn’t need give any secret inform ation to all users and have a secure channel to transport the inform ation
Platform: | Size: 182272 | Author: 庆喜 | Hits:

[Special Effectssecret-sharing-ideas

Description: 针对图像秘密共享前需要像素置乱的问题,基于(t, n)门限多重秘密共享思想,提出一种免置乱的图像秘密共享方案,以第n+1人的秘密份额作为因子参与秘密分割与重构,加大相邻像素之间的差距-Based on (t, n) threshold multiple secret sharing ideas, and put forward a kind of scrambling image from secret sharing scheme to n+ 1 people share the secret as factors involved in secret segmentation and reconstruction, increase the gap between adjacent pixels
Platform: | Size: 390144 | Author: 庆喜 | Hits:

[Mathimatics-Numerical algorithmsThreshold-secret-sharing

Description: 利用椭圆曲线离散对数问题的难解性, 给出了一个基于拉格朗日插值的( t, n) 门限秘密共享 方案-By mean s of the in t ractab ility of Ellip se Cu rve D iscrete Logarithm P rob2 lem (ECDL P) , a ( t, n) secret sharing th resho ld scheme based on L agrange in sert value is p resen ted.
Platform: | Size: 177152 | Author: 庆喜 | Hits:

[Special EffectsImage-Secret-Sharing-

Description: Image Secret Sharing and Hiding with Authentication
Platform: | Size: 1374208 | Author: liuli | Hits:

[CA authA-Secret-Sharing-Based-Method-for-Authentication.

Description: secret sharing based method
Platform: | Size: 1205248 | Author: prasad | Hits:

[Crack HackShamir's Secret Sharing-JavaScript

Description: Shamir's Secret Sharing 秘密分享使用JavaScript实现(Shamir's Secret Sharing Secret Sharing USES JavaScript implementation)
Platform: | Size: 2048 | Author: hkkhuang | Hits:

[Crack HackShamir Secret Sharing

Description: shamir secret sharing加解密实现(shamir secret sharing encryption)
Platform: | Size: 27648 | Author: masitian | Hits:
« 12 3 4 »

CodeBus www.codebus.net