搜索资源列表
Comparison-Based-Analysis-of-Different-Cryptograp
- Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of techn
pkcs-11v2-20d3
- 在密码系统中,PKCS#11是公钥加密标准(PKCS, Public-Key Cryptography Standards)中的一份子 ,由RSA实验室(RSA Laboratories)发布[1],它为加密令牌定义了一组平台无关的API ,如硬件安全模块和智能卡。 PKCS#11称为Cyptoki,定义了一套独立于技术的程序设计接口,USBKey安全应用需要实现的接口。 -In cryptography, PKCS# 11 is the Public Key Cryptography
2_6_flow_cytometry_lecture_optical_filters
- This file is about cryptography algorithm It ll be helpful for new developers
04-Image-Warping
- This file is about cryptography algorithm It ll be helpful for new developers
3.1-3.2-book-quiz
- This file is about cryptography algorithm It ll be helpful for new developers
code
- use of cryptography to hide textin an image
mi-ma-xue
- 密码学全部课件,pdf格式的,适合大家学习-Cryptography all courseware, pdf format, for them to learn
aes
- 一个很有用的密码学课程设计资料,希望对从事密码学研究的人有所帮助。-Cryptography Course Design Information A useful, I hope to engage in research into cryptography help people.
crypto
- this a pdf book talking about cryptography and its benifits for developpment and encountering new specifications.-this is a pdf book talking about cryptography and its benifits for developpment and encountering new specifications.
cryptography_latest.tar
- Historically developed to ensure secrecy in the mail, encryption of information today is used more broadly to prohibit access to or modification of sensitive data and ensure confidentiality in computer applications, so cryptology is the scien
CHAPTER-1
- In our project we are going to provide security in mobile Ad hoc network in ibriCT staff wireless. So we are going to learn how to use Threshold cryptography and how strong this method is. Also we will configure how mobile phones are communicated.
AES
- ASE code for Hardware namely FPGA ! keep in touch by puting your comment
extract
- ECC Cryptography book ! Hope you Will enjoy reading it
2012_misc
- WHITE-BOX CRYPTOGRAPHY: HIDING KEYS IN SOFTWARE
Elliptic-Curve-Cryptography
- A brief algorithm to create ternary galois field of (3^x). through which large computation can be easily done.
C-cryptographic-algorithms-
- 介绍密码学基本知识,以及如何使用C语言去实现密码算法的资料-Introduces the basics of cryptography, and how to use C language to realize cipher data
codeandnetsafitysummary
- 西安交通大学密码学和网络安全课程的总结资料-Summaries of Xi' an Jiaotong University cryptography and network security courses
Assurance-System-in-Traditional-Body-Area-Network
- Rapid progression of wireless engineering systems, a special domain of sensor network which supports medical diligences is the development of Autonomous Wireless Body Area Network. In this type of environment such as monitoring the health condition o
Rapport-Cryptographie
- document on cryptography study and implementation of any encryption algorithm and signature.
SM2_PART4
- SM2椭圆曲线公钥密码算法。第4部分:公钥加密算法-SM2 elliptic curve public key cryptography algorithms. Part 4: public key encryption algorithm