CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 源码下载 系统编程 CA认证

资源列表

« 1 2 34 5 6 7 8 9 10 ... 207 »
  1. Chapter15

    0下载:
  2. CRC编码,文件里工程实例,打开后,,里面有QPF后缀的文件,直接运行即可-CRC u7801 uFF0C u6587 u4EF6 u91C u5DE5 u7A0B u5B9E u4F8B uFF0C u6253 u5F00 u540E uFF0C uFF0C u91CC u9762 u6709QPF u540E u7F00 u7684 u6587 u4EF6 UFF0C u76F4 u63A5 u8FD0 u884C u5373 u5
  3. 所属分类:CA program

    • 发布日期:2017-12-13
    • 文件大小:165042
    • 提供者:
  1. Chapter14

    0下载:
  2. FPGA 信道的加密与解密,文件有工程实例,直接打开运行即可 -Quot u1 " U53EF
  3. 所属分类:CA program

    • 发布日期:2017-12-13
    • 文件大小:126770
    • 提供者:
  1. free-hex-editor-neo

    0下载:
  2. hex editor to break hex code of software which are written in hex.
  3. 所属分类:CA program

    • 发布日期:2017-12-16
    • 文件大小:17004544
    • 提供者:nikhil
  1. LL-encryption

    0下载:
  2. 图像加密代码,可以利用混沌理论对灰度图像加密和解密。-Image encryption code, you can use chaotic theory to grayscale image encryption and decryption
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:1385
    • 提供者:雷烈
  1. RSA-Assignment-2.1

    0下载:
  2. RSA algorithm implementation in c# using GUI
  3. 所属分类:CA program

  1. AES-Assignment-1.3

    0下载:
  2. AES algorithm implementation in c# with GUI
  3. 所属分类:CA program

  1. Hill-Cipher

    0下载:
  2. Encryption algorithm of Hill cipher with GUI in c#
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:48660
    • 提供者:Hasnain
  1. des.tar

    0下载:
  2. THE ALGORITHM WRITTEN IN C FOR BOTH ENCRYPTION AND DESCRYPTION AND CAN BE USED AS SINGLE MODULE FOR 3- des ALGORITHM
  3. 所属分类:CA program

    • 发布日期:2017-12-16
    • 文件大小:4096
    • 提供者:jospeh
  1. mbedtls-2.4.0-apache

    0下载:
  2. mbed-tls加密库源码,arm收购自polarssl-Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.
  3. 所属分类:CA program

    • 发布日期:2017-12-11
    • 文件大小:1914109
    • 提供者:zyb
  1. q1

    0下载:
  2. Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
  3. 所属分类:CA program

  1. diffie_hellman

    0下载:
  2. Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
  3. 所属分类:CA program

  1. discrete_log

    0下载:
  2. Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal
  3. 所属分类:CA program

« 1 2 34 5 6 7 8 9 10 ... 207 »
搜珍网 www.dssz.com