资源列表
Groestl_Reference_Implementation
- Groestl的优化的32bit的算法的实现,尽管Skein没有通过最后一轮竞选,但它本身仍是一种优秀的散列加密算法-Skein reference alogrithm, although Skein didn t pass the last round competition, it s a excellent alogrithm for hash encryption
chapter7_codes
- The ECC code for Encryption and Decryption for FPGA
EAX
- EAX AES implementation
InformationSecurity
- C Programs for various encryption and decryption algorithms like RSA,Hill cipher,Playfair,etc
VITERBI
- viterbi编码算法verilog实现-viterbi encoder, developed by verilog language
rc5.tar
- Rc5 Encryption algorithm ..
sign
- 对于ECC 进行加密解密运算,这里主要是ECDSA的签名-For ECC encryption and decryption operations, where mainly ECDSA signature
map-to-group-hashsss
- 将一个普通的数值对应到椭圆曲线上,即寻找图样曲线上的点,并且是整数值点,为后面的签名做好准备-The value corresponds to an ordinary elliptic curve, i.e. to find the point on the curve pattern, and is an integer value points to prepare for the subsequent signature
elgamal(1)
- ELGMAL加密技术,同时包含了椭圆曲线的加密运算,和数域对应的运算-ELGMAL encryption, elliptic curve contains the encryption operation, the operation corresponding to several fields
md5d
- 计算机加解密算法,基于密码学的MD5的算法,实现加解密的功能。-Encryption and decryption algorithm
information
- 一份关于信息内容安全的源代码,可以较好地保护信息内容的安全-A report on the information content security source code, can be used to protect the security of information content
hundunjami
- matlab代码混沌加密综合,其中包括了lorenz和猫映射-matlab encrytion used by lorenz and arnold