搜索资源列表
Research-Project-Proposal
- research project for cryptography RSA
Guide-to-Elliptic-Curve-Cryptography---Darrel-Han
- It need implementation of ECC crpyto engine
rc4
- RC4 Algorithm in Cryptography
RSA
- RSA Algorithm in Cryptography Algorithms
rc5h
- RC5 Algorithm in Cryptography
Introduction-to-Signcryption
- Signcryption is a new paradigm in public key cryptography that simultaneously fulfils both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditio
cis
- this is a project describing the cryptography
关于素数的研究已有相当长的历史
- 关于素数的研究已有相当长的历史,近代密码学的研究又给它注入了新的活力.在关于素数的研究中素数的测试是一个非常重要的问题-On the study of the prime has a long history, modern cryptography research and give it has injected new vitality. On the study of the prime prime test is a very important problem
CNS-2
- IT CONTAINS CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMS
RSA
- RSA公钥密码算法,包括自动生成逆元,加密和解密过程,附带源代码。-RSA public key cryptography algorithm, including the automatic generation of the inverse of the encryption and decryption process, with the source code.
subject
- 介绍网络信息安全的公钥密码体系,密钥的管理和隐藏技术-Introduction of network and information security, public key cryptography, key management and hiding techniques
Guide_to_Elliptic_Curve_Cryptography
- Describe for ECC(Elip curve cryptography)
Introduction_to_Modern_Cryptography
- 《Introduction to Modern Cryptography》是一本介绍现代密码学理论与实践的教程。有国外著名学者Jonathan Katz and Yehuda Lindell撰写,是密码学界不可多得资料。-This book presents the basic paradigms and principles of modern cryptography. It is designed to serve as a textbook for undergraduate- or
Kriptografi
- Cryptography using DES Algoritm
CryptoPPRef
- Cryptography refreance
01-intro-annotated
- The file is an introduction to Cryptography.
wpes2008
- Recent approaches for protecting information in data out- sourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by
theory
- Cryptography theory document
Windows_SEA
- 使用MIRACL 為底層的函式庫, 再利用C++ Builder 設計視窗化執行介面,在 Pentium 1.83G 的處理器上搭配1G 記憶體尋找 可供橢圓曲線密碼系統使用的質數階橢圓曲線 參數,基域為192、224、256、384、521 位元 平均分別需要580、1360、1884、20907、65862 秒可搜尋到一條質數階的橢圓曲線參數,且計 算一條橢圓曲線的階數平均分別需要31.6、 56.7、99.4、722.3、2726.0 秒。-Use MIRA
Establishing-Pairwise-Keys-in-Distributed-Sensor.
- Establishing Pairwise Keys in Distributed Sensor Networks DONGGANG LIU, PENG NING and RONGFANG LI North Carolina State University Pairwise key establishment is a fundamental security service in sensor networks it enables sensor nodes to com