搜索资源列表
DEScode
- DES算法程序编程介绍,便于使用者了解其加密原理,更好地为系统安全服务。-DES algorithm programming, user-friendly understanding of its encryption theory, a better system for security services.
opencsp
- 微软CSP实现源码。 CSP:密码服务提供者。 微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。 -Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAP
DigitalSign
- its perfect Digital signing application. with document !!! alice/bob
code
- C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within the .NET initiative a
code245
- C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within the .NET initiative a
rc4crypt
- rc4 RC4 was initially a trade secret, but in September 1994 a descr iption of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leaked code
rc4dotnet
- cr4-dotnet RC4 was initially a trade secret, but in September 1994 a descr iption of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leak
mydes
- 第一部分 数据加密标准DES (1)掌握DES中各加密函数对其性能影响; (2)DES的特性分析,包括互补性和弱密钥; (3)DES的实际应用,包括各种数据类型的加/脱密、DES的短块处理。 -The first part of the Data Encryption Standard DES (1) grasp the DES encryption function of each effect on its performance (2) DES characteristi
islab
- this hill cipher, mona cipher, poly and play fair cipher technique in cryptography.it is used to encrypt multiple letters at a time.it is implemented in c++.at a time 1 or more than letters are encrypted and also can decrypted ..and runlength coding
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Se
ceaser
- its ceaser cipher code-its ceaser cipher code...
DES
- 加密算法DES的源程序,包含源代码及其必要的注释,该程序可以在windows下运行-the coding program of DES, the program and its commenting, the program can be run in th windows operation.
Cryptanalysis-INCrypt32-of-iCLASS
- Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse engineering, chosen message at
Message-Authentication
- 消息认证算法介绍,包含其功能特点,几种认证算法的对比-The message authentication algorithm, including its features, the comparison of several authentication algorithms
Kodzik
- It is a program to encrypt files of any type of content by overwriting its contents. The program uses the XOR cipher. File after the encoding operation continues under the current name. A program written using Delphi.- It is a program to encrypt
rsa
- its source code of rsa in c
aes-module
- its a aes source code in verilog
AES
- AES algorithm implemented in JAVA. The code generates AES Key, Encrypts and Decrypts. Its a command line code
speedhack_185
- its a speed hack d-its a speed hack dll
india
- 数字图像在现代生活中的应用日益广泛,在一些领域中 须关注其安全问题,例如,军事、医疗和商业图片通常需 进行保密传送。目前最佳的保密手段是采用加密算法。但 于图像的数据量通常较大,因此图像加密时间较长。研究 提出了各种图像加密技术,利用图像的各种性质进行加密 而提高加密速度[1]。现有图像加密技术可以分为空域图像 密技术、变换域图像加密技术和压缩编码图像加密技术。 文研究的图像加密算法属于空域图像加密技术。在文献[2] 出的自适应图像加密算法的基础上,本文给出一种改