搜索资源列表
ic-card
- 软件编写初衷是教你如何调用DLL动态库以及实现对DAS等系列产品的硬件调用与应用。。。 可惜的是如你没有相关硬件,软件调试时将打开串口的函数关掉即可进入。 现上传的源程序为读写非接触式IC卡部分的程序工具-software development was to teach you how to call DLL DLL DAS and the realization of a series of products called the hardware and applications.
pkcs11-engine
- 使用openssl完成pkcs11功能的工程,使用Engine方式实现,可以在此基础上调用自己的硬件设备完成密码运算。使用C语言开发,是学习openssl,pkcs11,Engine机制不可多得的样例程序。-Function using the openssl pkcs11 complete the project, be achieved using the Engine can be invoked on the basis of their hardware equipment to co
des
- 数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。-Data encryption algorithm (Data Encryption Algorithm, DEA) of the Data Encryption Sta
hsm
- Hsm Atalla Hardware Security Module (HSM) that is used by banks and processors for cryptographic operations, such as verifying/translating PIN blocks, authorising transactions by verifying CVV/CSC numbers
DogDemo
- DogDemo是获取加密狗软硬件,以及学习破解的好软件-DogDemo is to obtain the dongle software and hardware, as well as learning break the good software
KG
- 序列密码也称为流密码(Stream Cipher),它是对称密码算法的一种。序列密码具有实现简单、便于硬件实施、加解密处理速度快、没有或只有有限的错误传播等特点,因此在实际应用中,特别是专用或机密机构中保持着优势,典型的应用领域包括无线通信、外交通信。若能以一种方式产生一随机序列(密钥流),这一序列由密钥所确定,则利用这样的序列就可以进行加密,即将密钥、明文表示成连续的符号或二进制,对应地进行加密。-Stream cipher is also known as Stream Cipher (St
bluetooth
- 蓝牙协议v2.0加解密和认证算法的实现,其中包括C++源代码,以及设计文档和相关参考资料,以及硬件实现的verilog代码。-Bluetooth protocol v2.0 encryption and authentication algorithm, which includes C++ source code, and design documents and related reference materials, and hardware implementation verilog
Md5Sopc
- 在Altera平台上实现Md5算法的IP核 modelsim进行MD5硬件代码的仿真和测试 quartusII 和nios软件实现ip核和驱动程序 已经测试程序的仿真和测试 代码调试通过 -Md5 algorithm simulation and test implementation in the Altera IP core platform modelsim the MD5 code simulation and test hardware and quartusII ip nios so
9781441980793-c1
- Hardware Implementation of Hash Functions
qlkaraoke_BY-NGUYENCAU.NET
- Lempel–Ziv–Welch (LZW) is a universal lossless data compression algorithm created by Abraham Lempel, Jacob Ziv, and Terry Welch. It was published by Welch in 1984 as an improved implementation of the LZ78 algorithm published by Lempel and Ziv in 1978
Phelix-Optimized
- Phelix 1 is a high-speed stream cipher with a built-in MAC func- tionality. It is efficient in both hardware and software. On current Pentium CPUs, Phelix has a per-packet overhead of less than 900 clocks, plus a per- byte cost well under 8