资源列表
Chapter15
- CRC编码,文件里工程实例,打开后,,里面有QPF后缀的文件,直接运行即可-CRC u7801 uFF0C u6587 u4EF6 u91C u5DE5 u7A0B u5B9E u4F8B uFF0C u6253 u5F00 u540E uFF0C uFF0C u91CC u9762 u6709QPF u540E u7F00 u7684 u6587 u4EF6 UFF0C u76F4 u63A5 u8FD0 u884C u5373 u5
Chapter14
- FPGA 信道的加密与解密,文件有工程实例,直接打开运行即可 -Quot u1 " U53EF
free-hex-editor-neo
- hex editor to break hex code of software which are written in hex.
LL-encryption
- 图像加密代码,可以利用混沌理论对灰度图像加密和解密。-Image encryption code, you can use chaotic theory to grayscale image encryption and decryption
RSA-Assignment-2.1
- RSA algorithm implementation in c# using GUI
AES-Assignment-1.3
- AES algorithm implementation in c# with GUI
Hill-Cipher
- Encryption algorithm of Hill cipher with GUI in c#
des.tar
- THE ALGORITHM WRITTEN IN C FOR BOTH ENCRYPTION AND DESCRYPTION AND CAN BE USED AS SINGLE MODULE FOR 3- des ALGORITHM
mbedtls-2.4.0-apache
- mbed-tls加密库源码,arm收购自polarssl-Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.
q1
- Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
diffie_hellman
- Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
discrete_log
- Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx where 1 ≤ x ≤ 240. Your goal