资源列表
DES
- 关于java的加密,不是很完全,不要介意-about java
1983_Algorithms_Robert-Sedgewick
- 1983 Algorithms Robert Sedgewick
libtomcrypt-0.96
- 密码学中常用的密码库函数!有助于密码学的研究!-Cryptography library functions commonly used in the password!
TranspositionCipher
- cipher message in transportation method by c# language
projeect
- SDES implementation in matlab
HillCipher_LinearAlgebra_Project
- implementation of Hill cipher algorithm in matlab
8-Mina_Mishra
- This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing
20090603
- Abstract Developing technologies in the field of network security. The main motive of this paper to instigate the fast developing cryptography researchers and to increase the security development in the field of information security. In this
SHA1_VC
- SHA1, 常用的SHA1,用于数字签名等-sha1,common sha1,userd for ca
FDA21-CFR11
- Guidance for Industry Part 11, Electronic Records Electronic Signatures — Scope and Application
base64
- Base64加密和解密的开源代码,可直接加入工程进行操作-Base64 encryption and decryption of open source code can be added directly operate the works
pollard
- Pollard p-1算法实现 Pollard 方法由Pollard于1974年提出,其基本想法是这样的:设素数,由Fermat小定理,又有,因此就可能是的一个非平凡因子。当然,问题在于我们并不知道是多少。一个合理的假设是的因子都很小,比如说,所有素因子都包含在因子基中,我们来尝试着找到一个能够“覆盖”,即是说,从而,因此我们可以转而求来获得所要的非平凡因子。例如设素因子上限为,便可以简单的取或是最小公倍数.-Pollard p-1 algorithm