搜索资源列表
-
0下载:
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对
-
-
0下载:
this the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.-this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic te
-
-
0下载:
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or
-
-
0下载:
The AT88SC25616C member of the CryptoMemory® family is a high-performance secure memory
providing 256 Kbits of user memory with advanced security and cryptographic features built
in.-AT88SC25616C
-
-
0下载:
Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies
---A Case Study for User Identification ---
Finger print identification and possibilities might be used to cheat finger print devices. How to choose fingerprin
-
-
0下载:
Establishing Pairwise Keys in Distributed Sensor
Networks
DONGGANG LIU, PENG NING and RONGFANG LI
North Carolina State University
Pairwise key establishment is a fundamental security service in sensor networks it enables sensor
nodes to com
-
-
0下载:
Wireless Sensor Networks (WSN) are becoming popular day by day,
however one of the main issue in WSN is its limited resources. We
have to look to the resources to create Message Authentication Code
(MAC) keeping in mind the feasibility of techn
-
-
0下载:
在密码系统中,PKCS#11是公钥加密标准(PKCS, Public-Key Cryptography Standards)中的一份子 ,由RSA实验室(RSA Laboratories)发布[1],它为加密令牌定义了一组平台无关的API ,如硬件安全模块和智能卡。
PKCS#11称为Cyptoki,定义了一套独立于技术的程序设计接口,USBKey安全应用需要实现的接口。
-In cryptography, PKCS# 11 is the Public Key Cryptography
-
-
0下载:
Quantum cryptography is a scientific discipline that exploits the laws of quantum mechanics to
perform cryptographic tasks, e.g., secure message transmission. It turns out that quantum
phenomena are in fact very useful for that purpose: The level
-
-
0下载:
Cryptographic algorithms are designed to protect data or communication in
the presence of an attacker. If these algorithms make use of a secret key, then
their security relies on the secrecy of the key. Hence, the primary objective
of an attack
-
-
0下载:
用途
国家密码管理局编制的商用算法,用于密码应用中的数字签名和验证、消息认证码的生成与验证以及随机数的生成,可满足多种密码应用的安全需求。
算法描述
对长度为l(l< 2^64) 比特的消息m,SM3杂凑算法经过填充和迭代压缩,生成杂凑值,杂凑值长度
为256比特。-Use
Commercial management algorithm, compiled by the Bureau of national code, used to generate th
-