-
voltage 公司提供的一个开发Ibe的工具包,
voltage 公司提供的一个开发Ibe的工具包,-voltage provided by a Ibe development tool kit
- 2022-08-14 06:16:26下载
- 积分:1
-
md5 算法的纯c版本。方便移植到各种嵌入式小型设备不支持c++的环境...
md5 算法的纯c版本。方便移植到各种嵌入式小型设备不支持c++的环境-md5 algorithm with pure C version. Easy to transplant it to systems using only C, but not C++
- 2022-08-15 21:19:56下载
- 积分:1
-
This program encodes and decodes a character using the Vigenere Square method
This program encodes and decodes a character using the Vigenere Square method
- 2022-01-26 03:25:56下载
- 积分:1
-
This is the original RSA algorithm implementation code can be used directly, has...
这是RSA算法的原代码实现应该直接能用,已调试好-This is the original RSA algorithm implementation code can be used directly, has good debugging
- 2022-05-26 09:40:10下载
- 积分:1
-
这是一个霍夫曼编码程序
这是一个霍夫曼编码程序-This is a Huffman code program
- 2022-02-16 05:22:56下载
- 积分:1
-
数字加密 数字加密 数字加密
æ•°å—åŠ å¯† æ•°å—åŠ å¯† æ•°å—åŠ å¯† -digital encryption, digital encryption, digital encryption, digital encryption, digital encryption, digital encryption
- 2022-03-23 12:18:33下载
- 积分:1
-
算术运算实现字母的替换。凯撒加密就是一种单字母替换法:通过用户给出密钥将字母加上密码变成密文...
算术运算实现字母的替换。凯撒加密就是一种单字母替换法:通过用户给出密钥将字母加上密码变成密文-Arithmetic operations to achieve the replacement of letters. Caesar encryption is the replacement of a single-letter law: the user is given the letter key will be encrypted into a ciphertext
- 2022-03-29 03:50:45下载
- 积分:1
-
études and implementation ofaesin c
études and implementation ofaesin c
- 2022-03-23 03:02:10下载
- 积分:1
-
斯坦福大学的密码学家身份认同
斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
- 2023-04-19 02:10:03下载
- 积分:1
-
DES算法全称为Data Encryption Standard,即数据加密算法,DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位...
DES算法全称为Data Encryption Standard,即数据加密算法,DES算法把64位的明文输入块变为64位的密文输出块,它所使用的密钥也是64位。RSA的安全性依赖于大数分解。公钥和私钥都是两个大素数( 大于 100个十进制位)的函数。本程序为适合初学者的rsa算法java源码及des源码,开发环境eclipse3.4-DES algorithm called the Data Encryption Standard, that is, data encryption algorithm, DES algorithm to express the 64-bit input block into a 64-bit output ciphertext block, it is also used 64-bit key. RSA" s security depends on the decomposition of large numbers. Public key and private key are two large prime numbers (more than 100 decimal places) of the function. This procedure is suitable for beginners of rsa algorithm java source and des-source, development environment eclipse3.4
- 2023-01-27 23:40:03下载
- 积分:1