CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 系统编程 CA认证 搜索资源 - .s

搜索资源列表

  1. 1303.3485

    0下载:
  2. Proposed Video Encryption Algorithm v/s Other Existing Algorithms: A Comparative Study
  3. 所属分类:CA program

    • 发布日期:2017-04-29
    • 文件大小:347422
    • 提供者:hany
  1. bcps

    0下载:
  2. BCPS initial code, Not used to this area of work. Still starting to understand the other s work and learn them. thank you.-BCPS initial code, Not used to this area of work. Still starting to understand the other s work and learn them. thank you.
  3. 所属分类:CA program

    • 发布日期:2017-04-25
    • 文件大小:168230
    • 提供者:vini
  1. hide_final.m.tar

    0下载:
  2. stegnography s hiding part of gray scale image within rgb image
  3. 所属分类:CA program

    • 发布日期:2017-04-12
    • 文件大小:1260
    • 提供者:saurabh
  1. RSA-2048-SignVerifySign

    1下载:
  2. CA认证系统中使用最广泛的证书载体是USBKEY,国内各大产商一般是使用CSP服务来提供加解密服务。这个例子是2048位的RSA数字签名与验证签名,使用厂家自带的csp来实现(若下载者没有安装任何USBKEY的驱动,可将代码中的TEST_CSP_NAME宏改为NULL 即调用微软自带的csp),编译环境VC6.0。-CA authentication system is the most widely used carrier certificate in USBKEY, the major d
  3. 所属分类:CA program

    • 发布日期:2017-04-02
    • 文件大小:12031
    • 提供者:张磊
  1. READ-CERT

    0下载:
  2. 这是一个解析X509证书的例子,运行后将xx.cer证书文件分解成一个详细的结构体,使用微软自带的CSP服务实现,编译环境VC6.0-This is an example of analytic X509 certificates, after the operation will be xx. The cer certificate files into a detailed structure, using Microsoft s own CSP service implementation
  3. 所属分类:CA program

    • 发布日期:2017-04-26
    • 文件大小:14977
    • 提供者:张磊
  1. winhexCn

    0下载:
  2. 好用的功能,实用且简单操作哟。大家共同分享。-very good s program
  3. 所属分类:CA program

    • 发布日期:2017-05-07
    • 文件大小:1136527
    • 提供者:sxl
  1. Euler_Totient

    0下载:
  2. Euler s Totient Function implementation in matlab. Used in cryptography.
  3. 所属分类:CA program

    • 发布日期:2017-04-12
    • 文件大小:686
    • 提供者:Jinesh
  1. ecc-order

    0下载:
  2. elliptic curve 求 order- find elliptic curve’s order
  3. 所属分类:CA program

    • 发布日期:2017-04-12
    • 文件大小:756
    • 提供者:yue huang
  1. OrayDesktopContainer

    0下载:
  2. 艾薇儿埃文斯的弗格森 的弗格森的风格-Alfa S the amount of flood sent to send to
  3. 所属分类:CA program

    • 发布日期:2017-04-29
    • 文件大小:429304
    • 提供者:李冬
  1. SPN

    0下载:
  2. SPN加密解密,有短块处理,采用相同的S盒,能完成基本的加密解密功能,大致就是这样的啦-SPN encryption and decryption, with short block processing, using the same S-box, to complete the basic encryption and decryption functions, so it generally is
  3. 所属分类:CA program

    • 发布日期:2017-04-29
    • 文件大小:330862
    • 提供者:
  1. keydes

    0下载:
  2. a program to implement DES s key generation.
  3. 所属分类:CA program

    • 发布日期:2017-04-12
    • 文件大小:745
    • 提供者:phyber
  1. DES

    0下载:
  2. The Advanced Encryption Standard (AES), also known as Rijndael[4][5] (its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
  3. 所属分类:CA program

    • 发布日期:2017-04-14
    • 文件大小:3548
    • 提供者:hani
  1. Yush.java.tar

    0下载:
  2. This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII c
  3. 所属分类:CA program

    • 发布日期:2017-04-12
    • 文件大小:878
    • 提供者:Aman Virmani
  1. Monoalphabetic-Cipher

    0下载:
  2. In cryptography, a Caesar cipher, also known as Caesar s cipher, the shift cipher, Caesar s code or Caesar shift, is one of the simplest and most widely known
  3. 所属分类:CA program

    • 发布日期:2017-04-14
    • 文件大小:2820
    • 提供者:neharika
  1. BLAKE2-master

    0下载:
  2. BLAKE2 are cryptographic hash functions based on Dan Bernstein s Cha stream cipher, but a permuted copy of the input block, XORed with some round constants, is added before each Cha round. Like SHA-2, there are two variants differing in the word size
  3. 所属分类:CA program

    • 发布日期:2017-12-12
    • 文件大小:497197
    • 提供者:Jonathan Young
  1. prob3

    0下载:
  2. Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
  3. 所属分类:CA program

  1. q1

    0下载:
  2. Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a digital signature. A verifies
  3. 所属分类:CA program

« 1 2 3 4 5»
搜珍网 www.dssz.com