当前位置:
首页
资源下载

搜索资源 - cryptographic security
搜索资源列表
-
0下载:
MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly
-
-
0下载:
Cryptographic security framework
-
-
0下载:
本加密程序基于著名的TEA加密算法,密钥长度为128位,安全性高于DES算法(56位).
该算法安全、简洁、高效,加密解密速度极快,占用内存极少,非常适合于嵌入式系统
的加密解密,也能胜任大系统的安全性能要求。算法能防止常见的密码学攻击。
本程序中待加密的明文、加密生成的密文皆按64位数据分组进行加解密。
密钥长度128位,与AES、IDEA相当,从而确保足够的安全性。-The encryption program is based on the famous TEA
-
-
2下载:
微软CSP实现源码。
CSP:密码服务提供者。
微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。
-Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAP
-
-
0下载:
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对
-
-
0下载:
Microsoft s .NET framework has robust support for encryption in the System.Security.Cryptography namespace. Everything you need to perform encryption is available in that class, but it s difficult to understand unless you have a firm grasp of cryptog
-
-
0下载:
AES加密算法分析及其安全性研究,对于使用AES密码算法来研究网络、流媒体安全的程序员有帮助-AES encryption algorithm analysis and security research, for the use of AES cryptographic algorithm to study the network, security, streaming media programmers help
-
-
0下载:
this the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.-this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic te
-
-
0下载:
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or
-
-
0下载:
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art descr ipt
-
-
0下载:
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
-
-
0下载:
Cryptographic filesystem with plausible deneyability. Withdrawn by original developers.
Good for study of filesystem concepts of plausible deniability.
Here the filesystem has a need to know approach.
So if one has not enough security clearance
-
-
0下载:
数据加密算法---3DES的C实现,效率高,安全可靠,可移植性好,能满足一般的加密安全需求。---- 3DES data encryption algorithm in C to achieve high efficiency, safety and reliability, portability is good, can hardly meet the cryptographic security requirements.
-
-
0下载:
matrixssl是一套SSL通信加/解密库,它的设计目标是嵌入式应用,因此整个库非常小,编译后的代码长度只有openssl的1/20左右。-MatrixSSL is an embedded, open source SSL implementation designed for small
footprint applications and devices. It is designed to reduce the complexity of integrating
SSL into
-
-
0下载:
Reliable communication is mission critical to Emergency and Rescue operations.
MANET technology allowing communication where fixed infrastructure is not available
is very attractive for this setting. Emergency and Rescue operations may take place
-
-
0下载:
Develop a communications security architecture incorporating cryptographic security mechanisms that efficiently support the provision of required integrity, authentication, and confidentiality security services within distributed networks of resource
-
-
0下载:
StreamSec2.1工具是在Borland delphi开发环境下安全的加密收集相关组件和类。该产品包括模块化的SSL / TLS的,S / MIME和X.509的实现。- StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The
-
-
0下载:
Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns
-
-
0下载:
Cryptographic Module
Security Policy
for
jNet Citadel-OS on Atmel
AT90SC144144CT
-
-
0下载:
里面包含DES,AES,RSA,DSA,ESS,SHA等的算法源码,对学习网络安全算法的人挺实用的。代码很齐全。-Containing DES, AES, RSA, DSA, ESS, SHA algorithms such as source code, to learn network security algorithms were very useful. Code is complete.
-