搜索资源列表
security
- 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现 利用数字信封实现大文件的加密、解密。 2、有什么用: 2.1 研究、学习信息安全中的密码学设计与实现技术。 2
PKICSP
- 基于PKI加密设备的CSP软件设计与实现-PKI-based encryption device software design and implementation of CSP
ca-system
- 这是一个关于数字证书的系统,里面有详细的设计说明,对于编程设计有一定的帮助。-This is a digital certificate on the system, there are detailed design shows that the program will certainly help with the design.
CIRCLE3
- Design of various graphics symbols using C++.
jiami
- 应用加密算法和认证技术.ECB模式和CBC模式的加密过程.有两种模式的加密源代码和课程设计报告。-Application of encryption algorithms and authentication techniques. ECB mode and CBC mode encryption. There are two modes of encryption source code and program design report.
computerandnetworksecurity
- 此为本人的网络安全技术上的有关加密解密算法的一个课程设计。-This is my network security technology to the encryption and decryption algorithms of a course design.
EllipticCurveDigitalSignatureAnalysisandDesign
- 椭圆曲线的数字签名的分析与设计 椭圆曲线的数字签名的分析与设计-Elliptic Curve Digital Signature Analysis and Design
inter-domain-test
- Xen 域间通信的访问控制的例子,主要用于TPM的域间密钥共享协同。在Xen/Linux上实现的一个原型系统。-In this thsis, we introduce a TPM based trust scheme and secure protocol for VM, and develop a prototype system of the secure protocol for Xen/Linux virtualization system. The trust scheme can p
AES-algorithm-for-designer
- AES算法 ,从设计到编程完全有学生来完成,很适合课程设计者使用-AES algorithm, programming from design to complete a student to complete, it is used for course designers
8-Mina_Mishra
- This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing
xitong
- 毕业设计的一个系统,源码及论文+可执行程序-A system of graduated design, source code and papers+ executable program
sha1
- Use to do SHA1 encode,SHA-1 produces a 160-bit message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.-Use to do SHA1 encode,
pailiema
- n=4的排列码设计,可以实现文件的加密、解密。内附有明文,也可自行编写。-n = 4, the permutation code design, can achieve file encryption, decryption. Enclosed expressly, or write your own.
10
- 提出了一种基于元模型建模和聚类算法的设计空间减缩策略 能直接将设计空间减小到相对小的子空间-Based element modeling and clustering algorithm design space reduction strategy direct the design space is reduced to a relatively small subspace
sha1
- SHA1算法为基础的加密程序,主要用于信息安全课程设计的普通数据加密的课题,运行环境在C++6.0 -SHA1 algorithm based encryption program, mainly for information security, data encryption ordinary course design topics, the operating environment in C++6.0
bluetooth
- 蓝牙协议v2.0加解密和认证算法的实现,其中包括C++源代码,以及设计文档和相关参考资料,以及硬件实现的verilog代码。-Bluetooth protocol v2.0 encryption and authentication algorithm, which includes C++ source code, and design documents and related reference materials, and hardware implementation verilog
SHA
- SHA-1 produces a message digest based on principles similar to those used by Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design.SHA-2 is a set of cryptographic hash functions (SHA-22
AES-Encryption
- Slides in power point help to understand the a symmetric block cipher called ADVANCED ENCRYPTION STANDARD - (AES) Encryption by showing its definition, the way it works and the basics of its design.