CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 系统编程 CA认证 搜索资源 - example.a

搜索资源列表

  1. PlayfairCipher_codes

    0下载:
  2. Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854
  3. 所属分类:CA program

    • 发布日期:2017-04-03
    • 文件大小:132927
    • 提供者:黃文岩
  1. hill

    0下载:
  2. hill algorythm example. Just coding and no decoding.Not mine, just was a little bit changed.
  3. 所属分类:CA program

    • 发布日期:2017-04-11
    • 文件大小:694
    • 提供者:constantinius
  1. CreateRequest

    0下载:
  2. 这份代码演示了如何创建和使用ASN.1编码一份符合PKCS10规范的证书请求-This example code demonstrates how to create and encode a certificate request.
  3. 所属分类:CA认证

    • 发布日期:2013-06-25
    • 文件大小:2948
    • 提供者:jhcn
  1. Quebra-Senha

    0下载:
  2. simple example of a break password
  3. 所属分类:CA program

    • 发布日期:2017-04-06
    • 文件大小:270565
    • 提供者:algebra
  1. mMD5

    0下载:
  2. mMD5.c * example for illustrating how to open a file from MATLAB * and perform an MD5 checksum. * * takes a file name and no return values. Matlab6p5 version and VC6++ * Reference: MD5 in C by Tian-tai Huynh
  3. 所属分类:CA program

    • 发布日期:2017-03-31
    • 文件大小:4226
    • 提供者:zsvip
  1. myOwnAcegi

    0下载:
  2. Acegi Spring安全认证系统的配置的小例子-Acegi Spring security authentication system configuration example of a small
  3. 所属分类:CA program

    • 发布日期:2017-05-23
    • 文件大小:8092415
    • 提供者:soulighter
  1. MICCAIworkshopCVII_2

    0下载:
  2. The segmentation of structure from 2D and 3D images is an important rst step in analyzing medical data. For example, it is necessary to segment the brain in an MR image, before it can be rendered in 3D for visualization purposes. Segmentation
  3. 所属分类:CA program

    • 发布日期:2017-11-20
    • 文件大小:142877
    • 提供者:patel
  1. DES

    1下载:
  2. 可以用于多位二进制数加密解密的DES算法,在main函数中给出了使用范例,使用者可以比较并且了解到DES的雪崩效应。-Can be used for a number of binary encryption and decryption of DES algorithm, using the example given in the main function, the user can compare and understand the avalanche effect of DES.
  3. 所属分类:CA program

    • 发布日期:2017-11-09
    • 文件大小:139822
    • 提供者:子木
  1. PRAN

    0下载:
  2. 在使用C#编程,但伪随机数加密一直不知道是怎么实现的,今天研究了一下,看了一个使用伪随机数加密用户名密码的例子,觉得简单易懂,索性把源代码也共享出来,帮助更多想实现C#伪随机数加密的朋友。在演示窗口,输入密码的时候,会适时显示出经过加密的密码,挺有参考价值。-In the use of C# programming, but pseudo-random number encrypted did not know how to achieve today study a little, read
  3. 所属分类:CA program

    • 发布日期:2017-04-16
    • 文件大小:10902
    • 提供者:zengzheng
  1. Soft

    0下载:
  2. 使用增强算法加密文件的例子,源代码。很好的例子。-Using enhanced algorithm encrypted file example, the source code.A good example.
  3. 所属分类:CA program

    • 发布日期:2017-04-24
    • 文件大小:74820
    • 提供者:牟宗存
  1. RSA-2048-SignVerifySign

    1下载:
  2. CA认证系统中使用最广泛的证书载体是USBKEY,国内各大产商一般是使用CSP服务来提供加解密服务。这个例子是2048位的RSA数字签名与验证签名,使用厂家自带的csp来实现(若下载者没有安装任何USBKEY的驱动,可将代码中的TEST_CSP_NAME宏改为NULL 即调用微软自带的csp),编译环境VC6.0。-CA authentication system is the most widely used carrier certificate in USBKEY, the major d
  3. 所属分类:CA program

    • 发布日期:2017-04-02
    • 文件大小:12031
    • 提供者:张磊
  1. READ-CERT

    0下载:
  2. 这是一个解析X509证书的例子,运行后将xx.cer证书文件分解成一个详细的结构体,使用微软自带的CSP服务实现,编译环境VC6.0-This is an example of analytic X509 certificates, after the operation will be xx. The cer certificate files into a detailed structure, using Microsoft s own CSP service implementation
  3. 所属分类:CA program

    • 发布日期:2017-04-26
    • 文件大小:14977
    • 提供者:张磊
  1. read_cert_name

    0下载:
  2. 这是一个从usbkey中读取用户证书的例子,运行后将获取usbkey中的证书名称与颁发者信息,使用usbkey封装的CSP服务实现,编译环境VC6.0。 要配合usbkey使用。根据使用的key型号修改代码中宏CSP_NAME的值。(各厂商的sdk中都会有相应的说明)-This is an example of a read user certificate the usbkey, after the operation to get the name of the certificate
  3. 所属分类:CA program

    • 发布日期:2017-05-14
    • 文件大小:3536094
    • 提供者:张磊
  1. There-are-three-types-of-cryptography-techniques.

    0下载:
  2. Caesar cipher is a simple substitution cipher where each letter in the plain text is replaced with a letter a fixed number of places down the aplhabet. EXAMPLE If the number of places to shift is 3, the letter A would be converted to ltter D. Usi
  3. 所属分类:CA program

    • 发布日期:2017-04-26
    • 文件大小:66923
    • 提供者:pradeep
  1. diffeehellmanPROGRAM

    0下载:
  2. Example 1. To find 1537 x 4248 modulo 10, you could multiply out and take the last digit, but a better way would be to replace 1537 by 7 and 4248 by 8 to start, find 7 x 8 = 56, and then take 56 mod 10 to get 6 as the answer. A handy standard no
  3. 所属分类:CA program

    • 发布日期:2017-04-25
    • 文件大小:28510
    • 提供者:pradeep
  1. RC4-Prog

    0下载:
  2. Example 1. To find 1537 x 4248 modulo 10, you could multiply out and take the last digit, but a better way would be to replace 1537 by 7 and 4248 by 8 to start, find 7 x 8 = 56, and then take 56 mod 10 to get 6 as the answer. A handy standard no
  3. 所属分类:CA program

    • 发布日期:2017-04-25
    • 文件大小:36467
    • 提供者:pradeep
  1. prob3

    0下载:
  2. Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
  3. 所属分类:CA program

  1. diffie_hellman

    0下载:
  2. Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random number mod p. Now generate A,
  3. 所属分类:CA program

搜珍网 www.dssz.com