-
Cryptography Miller Rabin primality testing algorithm. Artificial preparation, u...
密码学中的Miller Rabin素性检测算法。人工编写,用这个来学习或者是交作业,绝对是过关利器。-Cryptography Miller Rabin primality testing algorithm. Artificial preparation, use this to learn or交作业is definitely a sharp object boundary.
- 2023-03-11 10:50:04下载
- 积分:1
-
C++ implementaion for RSA together with the Wiener attack.
It uses NTL librar...
C++ implementaion for RSA together with the Wiener attack.
It uses NTL library for big numbers
- 2023-01-04 06:30:03下载
- 积分:1
-
VB source code of MD5 algorithm is the MD5 algorithm for VB source code of MD5 a...
VB的MD5算法源码 VB的MD5算法源码-VB source code of MD5 algorithm is the MD5 algorithm for VB source code of MD5 algorithm for VB source code
- 2022-05-26 03:10:41下载
- 积分:1
-
DES算法BCB组件,有源码,DELPHI也可以用。
DES算法BCB组件,有源码,DELPHI也可以用。-DES algorithm BCB components, source code can also be used in Delphi.
- 2022-02-16 07:47:32下载
- 积分:1
-
DES的实现,平时上课的实验,供大家参考。
DES的实现,平时上课的实验,供大家参考。-DES implementation, usually in class experiments, for your reference.
- 2022-08-08 06:20:14下载
- 积分:1
-
RSA加密算法C语言编程实现
算法参考于《密码编码学及网络安全》上关于RSA加密算法的定义。相关程序在Visual C++ 6.0上能正确运行(估计在其他C语言编程环境下也能运行吧),程序里面详细写上了注解,希望能够给你带来帮助。
- 2022-03-16 12:20:33下载
- 积分:1
-
text encryption and decryption
文本加密和解密
- 2022-09-21 03:50:03下载
- 积分:1
-
易语言MD5加密程序... 没什么好多说的了 看了就懂了
易语言MD5加密程序... 没什么好多说的了 看了就懂了-Yi language MD5 encryption ...... nothing to say the viewers a much better understand the
- 2022-06-26 23:12:26下载
- 积分:1
-
它加密txt文件和cpp文件,并且创建key在你的软盘上,你可以用这个key加密文件.rar...
它加密txt文件和cpp文件,并且创建key在你的软盘上,你可以用这个key加密文件.rar-txt file encryption and cpp files and create key in your floppy disk, you can use this document encryption key. Rar
- 2022-02-13 20:16:22下载
- 积分:1
-
本书真实系统地介绍了密码学及该领域全面的参考文献。
全书共分四个部分,首先定义了密码学的多个术语,介绍了密码学的发展及背景,描述了密码学从简单到复杂的各种协...
本书真实系统地介绍了密码学及该领域全面的参考文献。
全书共分四个部分,首先定义了密码学的多个术语,介绍了密码学的发展及背景,描述了密码学从简单到复杂的各种协议,详细讨论了密码技术,并在此基础上列举了如DES、IDEA、RSA、DSA等10多个算法以及多个应用实例,并提供了算法的源代代码清单。
全书内容广博权威,具有极大的实用价值。自出版以来,得到业内专家的高度赞誉,是致力于密码学研究的专业及非专业人员一本难得的好书。-This book introduces the real system and the field of cryptography comprehensive references. Book is divided into four parts, first of all define the term more than cryptography, introduced the development of cryptography and background, describes cryptography from the simple to the complex variety of the agreement, a detailed discussion of cryptographic techniques, and on this basis cited, such as DES, IDEA, RSA, DSA algorithm, as well as more than 10 examples of multiple applications and provides the algorithm source code on behalf of the list. Broad authority of the contents of the book, has great practical value. Self-publishing has been highly praised the industry experts, is dedicated to the study of cryptography professional and non-professional a rare book.
- 2023-01-31 04:40:03下载
- 积分:1