登录
首页 » 加密解密 » 目前企业面临的计算环境和过去有很大的变化,许多数据资源能够依靠网络来远程存取,而且越来越多的通讯依赖于公共网络公共网络(如 Internet),而这些环境并不保...

目前企业面临的计算环境和过去有很大的变化,许多数据资源能够依靠网络来远程存取,而且越来越多的通讯依赖于公共网络公共网络(如 Internet),而这些环境并不保...

于 2022-03-25 发布 文件大小:5.44 kB
0 99
下载积分: 2 下载次数: 1

代码说明:

目前企业面临的计算环境和过去有很大的变化,许多数据资源能够依靠网络来远程存取,而且越来越多的通讯依赖于公共网络公共网络(如 Internet),而这些环境并不保证实体间的安全通信,数据在传输过程可能被其它人读取或篡改。-currently facing the enterprise computing environment and past a great change, many data resources to be able to rely on remote network access, and more and more dependent on public communications networks public networks (such as the Internet), which environment is not a guarantee of the security entities communications, data transmission possible by other people read or tampered with.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 最好的CRC程序.rar 最好的CRC程序.rar
    最好的CRC程序.rar 最好的CRC程序.rar-CRC
    2023-04-25 17:25:03下载
    积分:1
  • 斯坦福大学的码学家身份认同
    斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
    2023-04-19 02:10:03下载
    积分:1
  • AES标准
    128位(或192或256bit该代码以128为例)的密钥长度和分组长度,数据分组(输入的明文),先进行逐比特异或(AddRoundKey) 运算。然后通过循环十次非线性代换(SubBytes)、行变换(ShiftRows)、列变换(MixColumns)、逐比特异或【最后一轮不进行列变换】 的过程,输出128位(或192或256bit)数据即是密文。这就是加密过程。之后进行之前的逆过程,即可得到明文,此为解密过程。
    2022-07-09 23:35:31下载
    积分:1
  • 如何对一个已有字符串
    如何对一个已有字符串加密-how to have a string encryption
    2023-01-09 09:30:04下载
    积分:1
  • encrypt image
    加密数字图像的主要源码 加密数字图像的主要源码-encrypt image
    2023-04-06 13:20:04下载
    积分:1
  • 常见算法汇总的C++实现,初学算法者适用
    常见加密算法汇总的C++实现,初学加密算法者适用-Common encryption algorithm aggregate C++ Realize, learning to apply the encryption algorithm
    2022-01-20 23:18:21下载
    积分:1
  • RC5算法的C++实现
    RC5算法的C++实现-RC5 algorithm to achieve C
    2022-10-05 00:40:04下载
    积分:1
  • these two works mainly with a CSP. CSPTEST comparison was made mainly to the cha...
    这两个工程主要用CSP 1、CSPTEST 写的比较乱 主要是给当时一个朋友做参考调用的 完成非对称密钥的生成、导入、导出、加密、解密、对称的加密解密、签名、验证。 2、CSTTEST2 写的比前个好些,但是平时上班,下班自己也要写论文,所以花的时间也不太多,很多地方都偷懒了。比如文件大小我没有用NEW 而且指定了1024 有需要的朋友可以自己修改。这个工程主要是非对称的密钥的导出和导入,还有就是会话密钥的操作。-these two works mainly with a CSP. CSPTEST comparison was made mainly to the chaos when a friend called to refer to the completion of the non-symmetric key generation, importing and exporting, encryption, decryption, symmetric encryption and decryption, signature, the certification. 2, CSTTEST2 write better than in the previous months, but usually go to work and finish their own toilet paper so I spent the time is not too much, all of the lazy. For instance, file size I have not used the NEW 1024 and designated a need to amend their friends. The project mainly non-symmetric keys to the Export and Import, there is the session key operation.
    2022-03-21 02:06:35下载
    积分:1
  • AES IP core
    While there are many AES cores around, this one is designed with LUT6 based FPGA architecture in mind from day one.  The AES Decryption Core for FPGA implements the decryption portion of the AES (a.k.a. Rijndael) algorithm described in the FIPS-197 specification. Key lengths of 128 / 192 / 256 bits are supported, each with a separate instantiation wrapper. Since the core is designed to take advantage of LUT6 based FPGA archit
    2022-02-06 04:58:15下载
    积分:1
  • DES算法实现过程分析 之 C
    这是jacobi迭代算法-iterative algorithm to caculate Jacobi(matrix?)
    2022-08-20 17:12:01下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载