搜索资源列表
chaos
- this file envolves many document discribing the logistic map used in chaotic cryptography
mimaxueyudll
- 关于密码学的书籍,自己整理,包括vc编写Demo 技巧.pdf,vc中创建dll方法步骤.pdf,纯资源dll调用.pdf等-About cryptography books, his finishing, including vc Demo skills. PDF written, vc create DLL steps. PDF, pure resource DLL calls. PDF, etc
Wireless-Security
- Wireless Security and Cryptography Specifications and Implementations
Introduction-to-Cryptography--Principles-and-Appl
- cryptogrphy book end to end encryption
Crypto4e
- cryptography and computer security solution manual 4th ed
Sharone_Gorla_report_new(2)
- steganography with cryptography
Eurocrypt-2008
- 密码学国际顶级会议论文集,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
EUROCRYPT-2009
- 密码学国际顶级会议论文集,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
Eurocrypt-2010
- 密码学国际顶级会议论文集2010年,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
Eurocrypt-2011[1]
- 密码学国际顶级会议论文集2011年,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings2011years, cryptography researchers seeking valuable literature.
QCandSKD-introduction
- 本文讲述了量子密码的基本理论知识,通俗易懂-This article describes the basic theory of quantum cryptography knowledge, easy to understand
Cryptography
- Its is ryptography fundamental concept
wiley-interscience---computer-security-and-crypto
- wiley-interscience - computer security and cryptography
VisualCryptography(shamir)
- Visual Cryptography Moni Naor and Adi Shamir
JAK
- In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But appr
New-Microsoft-Office-Word-Document
- With the fast development of the computer technology and information processing technology, the problem of information security is becoming more and more important. Information hiding is usually used to protect the important information from disclosi
M-Java
- Java cryptography resource is a nice resource for programming for encryption and decryption.
AES
- 密码学中AES编码方式的详细过程的演示视频。-Cryptography, AES encoding process demonstration video.
Shamir_Sharing
- Shamir schemes for visual cryptography
gudianmimaxue
- 古典密码课设。C++ 多表古典加密方法主要有Playfair体制、Vigenere体制、Beaufor体制、Vernam体制和Hill体制,用高级语言实现其中一种体制的加密和解密算法。 -Classical cryptography class-based. C++ multi-table classical encryption methods Playfair system, Vigenere system, Beaufor system, Vernam system and Hill