搜索资源列表
1303.3485
- Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study
bcps
- BCPS initial code, Not used to this area of work. Still starting to understand the other s work and learn them. thank you.-BCPS initial code, Not used to this area of work. Still starting to understand the other s work and learn them. thank you.
hide_final.m.tar
- stegnography s hiding part of gray scale image within rgb image
RSA-2048-SignVerifySign
- CA认证系统中使用最广泛的证书载体是USBKEY,国内各大产商一般是使用CSP服务来提供加解密服务。这个例子是2048位的RSA数字签名与验证签名,使用厂家自带的csp来实现(若下载者没有安装任何USBKEY的驱动,可将代码中的TEST_CSP_NAME宏改为NULL 即调用微软自带的csp),编译环境VC6.0。-CA authentication system is the most widely used carrier certificate in USBKEY, the major d
READ-CERT
- 这是一个解析X509证书的例子,运行后将xx.cer证书文件分解成一个详细的结构体,使用微软自带的CSP服务实现,编译环境VC6.0-This is an example of analytic X509 certificates, after the operation will be xx. The cer certificate files into a detailed structure, using Microsoft s own CSP service implementation
winhexCn
- 好用的功能,实用且简单操作哟。大家共同分享。-very good s program
Euler_Totient
- Euler s Totient Function implementation in matlab. Used in cryptography.
ecc-order
- elliptic curve 求 order- find elliptic curve’s order
OrayDesktopContainer
- 艾薇儿埃文斯的弗格森 的弗格森的风格-Alfa S the amount of flood sent to send to
SPN
- SPN加密解密,有短块处理,采用相同的S盒,能完成基本的加密解密功能,大致就是这样的啦-SPN encryption and decryption, with short block processing, using the same S-box, to complete the basic encryption and decryption functions, so it generally is
keydes
- a program to implement DES s key generation.
DES
- The Advanced Encryption Standard (AES), also known as Rijndael[4][5] (its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
Yush.java.tar
- This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII c
Monoalphabetic-Cipher
- In cryptography, a Caesar cipher, also known as Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known
BLAKE2-master
- BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size
prob3
- Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
q1
- Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies