Welcome![Sign In][Sign Up]
Location:
Search - shamir Java

Search list

[Crack Hacksecretshare_java

Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 4876 | Author: linvg | Hits:

[JSP/JavaShamirAlgorithms

Description: 用java实现Shamir门限算法,可用于数据的加密解密,特别是传送加密密钥时有用-with java achieve Shamir threshold algorithm can be used for data encryption and decryption. Special transmission of the encryption key is useful when
Platform: | Size: 1818 | Author: XUN | Hits:

[Otherhowtosharesecret

Description: shamir的秘密分享机制的原文。秘密分享门限机制中,利用拉格朗日插值多项式来恢复。-shamir secret-sharing mechanism in the original language. Threshold secret sharing mechanism, the use of Lagrange polynomial interpolation to restore.
Platform: | Size: 184320 | Author: 黄海凌 | Hits:

[Crack Hacksecretshare_java

Description: Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 5120 | Author: linvg | Hits:

[JSP/JavaShamirAlgorithms

Description: 用java实现Shamir门限算法,可用于数据的加密解密,特别是传送加密密钥时有用-with java achieve Shamir threshold algorithm can be used for data encryption and decryption. Special transmission of the encryption key is useful when
Platform: | Size: 2048 | Author: XUN | Hits:

[JSP/JavarsaCipher

Description: In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.-In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.
Platform: | Size: 1024 | Author: DS | Hits:

[Crack HackShamir

Description: Shamir Scheme. Implmentació a cryptographic protocol based on the threshold scheme.
Platform: | Size: 41984 | Author: knals | Hits:

[Crack HackShamir

Description: Shamir秘密分享算法的C#实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application of Lagrange polynomial method of technology insertion to restore the original polynomial, then calculated the main key.
Platform: | Size: 2179072 | Author: | Hits:

[JSP/Javavisual-java-e

Description: Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994.
Platform: | Size: 384000 | Author: rahul | Hits:

CodeBus www.codebus.net