资源列表
report
- The project focuses on implementation of the AES algorithm on the 8051 controller. The algorithm is implemented on the microcontroller 8051. A UART is used to give the inputs and outputs are displayed on 16x2 LCD. Initially the algorithm has been imp
CEASER
- classical CEASER CIPHER Cryptography Technique implemented in C
BasicRSA_latest.tar
- projected results for the updating
truecrypt
- trucrypt software use to encrypt and decrypt
inter-domain-test
- Xen 域间通信的访问控制的例子,主要用于TPM的域间密钥共享协同。在Xen/Linux上实现的一个原型系统。-In this thsis, we introduce a TPM based trust scheme and secure protocol for VM, and develop a prototype system of the secure protocol for Xen/Linux virtualization system. The trust scheme can p
CAlementation
- CA安全认证系统的研究与实现CA Security Authentication System Research and Implementation-CA Security Authentication System Research and Implementation
hill
- hill algorythm example. Just coding and no decoding.Not mine, just was a little bit changed.
trivium_p3source
- Trivium software implementation
ceaser
- its ceaser cipher code-its ceaser cipher code...
SimpleCryptographer
- simpl cryptographi for you thankss!!!
Transposal
- trans position network security java program
PolyAlpha
- Poly alphabetic java program-network security