-
ShamirSharring
Shamir门限算法的C++实现,依赖于NTL开源代码库(Shamir threshold algorithm C++ implementation, relies on NTL open source code base)
- 2020-07-01 21:00:02下载
- 积分:1
-
Hash_sha256
sha256计算代码,非常好用的代码,大家可以用这个代码直接计算哈希值,sha256实现
依次执行
SHA256Init、
SHA256Update
SHA256Final
三个函数即可得到sha256结果(sha256 sourse code,Is very usefull)
- 2013-09-19 16:09:12下载
- 积分:1
-
Ibe_ext
IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点(IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve)
- 2020-06-29 20:40:02下载
- 积分:1
-
RSA-KEY
RSA公钥加密程序RSA公钥加密程序RSA公钥加密程序RSA公钥加密程序RSA公钥加密程序(RSA public key encryption program)
- 2013-09-06 09:42:15下载
- 积分:1
-
AES
AES-rijndael 算法的详细资料, 包括
AES加密算法中的SBox及其C语言实现.pdf
FIPS197(chs).pdf
FIPS197.pdf
nist.url
Rijndael.pdf
rijndael算法流程.swf
Rijndael算法深入的研究.doc
Rijndael算法优化技术研究.doc
公钥密码体制与有限域(2).pdf
一种基于伽罗瓦域的密码系统.pdf(AES-rijndael algorithm detailed information, including the AES encryption algorithm in C language and its SBox realize. PdfFIPS197 (chs). PdfFIPS197.pdfnist.urlRijndael.pdfrijndael flow algorithm. SwfRijndael-depth study of algorithms. DocRijndael algorithm optimization technology research. Doc public key cryptosystem over finite fields and (2). pdf Galois field based on the password system. pdf)
- 2008-05-06 17:17:00下载
- 积分:1
-
jaimi
信息安全的RSA与DES加解密算法的实现,用的是Visual C++MFC(Information Security RSA encryption and decryption with the DES algorithm, using the Visual C++ MFC)
- 2008-05-31 09:20:08下载
- 积分:1
-
RSA-KEY
RSA公钥加密程序RSA公钥加密程序RSA公钥加密程序RSA公钥加密程序RSA公钥加密程序(RSA public key encryption program)
- 2013-09-06 09:42:15下载
- 积分:1
-
dogsn
rockey6加密狗
dogsn名称为3000(dogsn3000)
- 2010-06-29 00:12:28下载
- 积分:1
-
Caesar-code
凯撒密码作为一种最为古老的对称加密体制,在古罗马的时候都已经很流行,他的基本思想是:通过把字母移动一定的位数来实现加密和解密。例如,如果密匙是把明文字母的位数向后移动三位,那么明文字母B就变成了密文的E,依次类推,X将变成A,Y变成B,Z变成C,由此可见,位数就是凯撒密码加密和解密的密钥。个人原创。(Caesar password as one of the most ancient symmetric encryption system in ancient Rome have been very popular, his basic idea is: by the letters move a certain number of bits to achieve encryption and decryption. For example, if the key is the number of bits of plaintext letters backward move three, the plaintext letter B into a ciphertext E, and so on, X will become Y-become a B,, and Z becomes C Thus, the median is the Caesar cipher encryption and decryption keys. Personal originality.)
- 2012-05-11 16:37:09下载
- 积分:1
-
EC-Verify-Signature
基于miracl大数库的椭圆曲线EC的验证签名算法的c语言实现(Based on large numbers miracl library EC verification of an elliptic curve signature algorithm c-language implementation)
- 2020-07-03 18:40:01下载
- 积分:1