CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 搜索资源 - Cryptanalysis

搜索资源列表

  1. IDEA

    0下载:
  2. IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-at
  3. 所属分类:Windows编程

    • 发布日期:2008-10-13
    • 文件大小:20.21kb
    • 提供者:huli
  1. dcades

    0下载:
  2. des差分密码分析实现源代码-des differential cryptanalysis achieve source code
  3. 所属分类:加密解密

    • 发布日期:2008-10-13
    • 文件大小:14.42kb
    • 提供者:林洋
  1. 差分分析(C++)

    0下载:
  2. 差分密码分析,此实验是对S-P密码体制的差分分析-differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
  3. 所属分类:加密解密

    • 发布日期:2008-10-13
    • 文件大小:136.28kb
    • 提供者:小华
  1. s_des

    0下载:
  2. DES是种抗密码分析更强的加密方法,尽管DES的安全强度一直是个争论的话题.现今在金融行业已十分流行. java实现的简单DES加密算法-DES is a stronger anti-cryptanalysis of encryption methods, despite the strength of DES security has always been a controversial topic. Present in the financial industry has been
  3. 所属分类:Applet

    • 发布日期:2017-04-02
    • 文件大小:6.04kb
    • 提供者:田伟
  1. cryptbasInC

    0下载:
  2. Cryptanalysis Source Code in C
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-03
    • 文件大小:15.74kb
    • 提供者:Bahar
  1. OpenSCA

    0下载:
  2. OpenSCA - An open source toolbox for Matlab side channel cryptanalysis -OpenSCA- An open source toolbox for Matlab side channel cryptanalysis
  3. 所属分类:matlab

    • 发布日期:2017-04-03
    • 文件大小:281.62kb
    • 提供者:swiss
  1. CryptanalysisofHwang-ChangsaTime-StampProtocolforD

    0下载:
  2. Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:386.57kb
    • 提供者:xiaowang
  1. CryptanalysisofaNewChaoticCryptosystemBasedonErgod

    0下载:
  2. Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.
  3. 所属分类:Document

    • 发布日期:2017-04-01
    • 文件大小:173.17kb
    • 提供者:xiaowang
  1. Cryptanalysisofanimageencryptionscheme

    0下载:
  2. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
  3. 所属分类:Document

    • 发布日期:2017-04-04
    • 文件大小:245.79kb
    • 提供者:xiaowang
  1. Introduction_to_cryptology_Part1_Basic_cryptology

    0下载:
  2. Introduction to Cryptograpy and Cryptanalysis
  3. 所属分类:software engineering

    • 发布日期:2017-03-26
    • 文件大小:129.17kb
    • 提供者:marara
  1. Introduction_to_cryptology_Part_3_Cryptographic_p

    0下载:
  2. Introduction to Cryptograpy and Cryptanalysis-part3
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-07
    • 文件大小:102.17kb
    • 提供者:marara
  1. Introduction_to_cryptology_Part_2_Symmetric_and_a

    0下载:
  2. Introduction to Cryptograpy and Cryptanalysis pART2
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-24
    • 文件大小:98.46kb
    • 提供者:marara
  1. Practical Attack on KeeLoq

    1下载:
  2. Practical Attack on KeeLoq. KeeLoq, cryptanalysis, block ciphers, slide attacks, meetin- the-middle attacks.
  3. 所属分类:加密解密

    • 发布日期:2013-06-06
    • 文件大小:456.69kb
    • 提供者:Tillman
  1. Cryptoanalysis of the KeeLoq block cipher

    1下载:
  2. KeeLoq block cipher, cryptanalysis, slide attacks, guessand- determine attacks, distinguishing attacks
  3. 所属分类:加密解密

    • 发布日期:2013-06-06
    • 文件大小:116.58kb
    • 提供者:Tillman
  1. waes

    0下载:
  2. cryptanalysis of an aes white box
  3. 所属分类:Compress-Decompress algrithms

    • 发布日期:2017-04-02
    • 文件大小:226.34kb
    • 提供者:akshay
  1. 2CryptanalysisofVideoEncryption

    0下载:
  2. Content security is an important issue in multimedia applications. In this paper we perform a cryptanalysis of several encryption algorithms that have been proposed to protect the privacy of MPEG video streams. In particular, we analyze the enc
  3. 所属分类:Multimedia program

    • 发布日期:2017-04-05
    • 文件大小:86.51kb
    • 提供者:wang
  1. crosscorelation

    0下载:
  2. In signal processing, cross-correlation is a measure of similarity of two waveforms as a function of a time-lag applied to one of them. This is also known as a sliding dot product or inner-product. It is commonly used to search a long duration signal
  3. 所属分类:matlab

    • 发布日期:2017-04-04
    • 文件大小:1.25kb
    • 提供者:Rafal
  1. DESdifferential-analysis-

    2下载:
  2. C语言实现——应用分组密码体制的基本原理,实现DES加解密,并分析 DES 的雪崩性质,对DES加密进行差分分析,并利用自己设计的S盒进行加密 -C language- Application of basic principles of block ciphers, DES encryption and decryption to achieve, and the nature of the avalanche DES, differential cryptanalysis of DES en
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2016-06-12
    • 文件大小:863kb
    • 提供者:赵子番
  1. Cryptanalysis-INCrypt32-of-iCLASS

    0下载:
  2. Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse engineering, chosen message at
  3. 所属分类:CA program

  1. Cryptanalysis-of-Multi-Prime-RSA

    0下载:
  2. Cryptanalysis of Multi-Prime RSA
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-30
    • 文件大小:232.83kb
    • 提供者:liyunfei
« 12 3 »
搜珍网 www.dssz.com