搜索资源列表
md5_c++
- 这是我从网上下载的代码,请大家自行测试,我的QQ号:15967322,希望大家与我交流!谢谢!-This is my downloaded from the Internet code, please self-testing, my QQ : 15967322, and I hope we exchange! Thank you!
Asmuth_Bloom
- Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. Asmuth-Bloom s threshold secret sharing scheme.-Secret sharing consists of recovering a secret S from a set of shares, each c
TinyCA2
- MiniCA减肥修正版 大部分源码来自王雪松的原作以及OpenSSL。(文件名基本保持原样,和USBKEY没有任何关系。) -Most weight loss MiniCA amended version of the original source from Xuesong and OpenSSL. (File name basically remain as it is, and has nothing to do USBKEY.)
PlayfairCipher_codes
- Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854
Rc5
- rc5 enc/dec unit you can encrypt or decryot you strings from this unit
Qamar_Encryption.Zip
- This program that i just have downloaded from internet and i want everybody enjoy!-This is program that i just have downloaded from internet and i want everybody enjoy!
3
- 代码实现了RE4加密算法可供广大朋友学习借鉴-RE4 code encryption algorithm for a vast number of friends to learn from
nist
- Random and pseudorandom bit generators (RBGs, PRBGs) are used for many purposes including cryptographic, modeling, and simulation applications. For cryptographic purpose, they are required in the construction of encryption keys, other cryptographic p
rc4crypt
- rc4 RC4 was initially a trade secret, but in September 1994 a descr iption of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leaked code
rc4dotnet
- cr4-dotnet RC4 was initially a trade secret, but in September 1994 a descr iption of it was anonymously posted to the Cypherpunks mailing list[3]. It was soon posted on the sci.crypt newsgroup, and from there to many sites on the Internet. The leak
coder
- simple encryption project for my own algorithm. note: for arabic letters, but you can change letter from the data base.
Security_I206458582007
- CAPTCHA CONTROL: myImageSecurity v 1.1 (With and Without GD Both Versions) This code provides Man-Machine Interaction (Human Interaction) for Web The security string is generated with randon angles. This simple but Powerful PHP is code used to verif
Click_Capt206362522007
- Click Captcha Stop the form spammers Click Captcha is a randomly generated gif file that is dynamically displayed in a random area below form with 9 random color combinations and the click number is randomly displayed to the right or left making 18
kdm
- 证书认证,从pem读取私钥,对xml文件解析,解密密文,得到解码所需密钥-Certificate from pem to read the private key, on the xml file parsing, decrypting the ciphertext to obtain the key needed for decoding
SHA256
- In cryptography, SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the National Security Agency (NSA) and published in 2001 by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Se
viaccess
- code source viaccess from philips
inter-domain-test
- Xen 域间通信的访问控制的例子,主要用于TPM的域间密钥共享协同。在Xen/Linux上实现的一个原型系统。-In this thsis, we introduce a TPM based trust scheme and secure protocol for VM, and develop a prototype system of the secure protocol for Xen/Linux virtualization system. The trust scheme can p
mMD5
- mMD5.c * example for illustrating how to open a file from MATLAB * and perform an MD5 checksum. * * takes a file name and no return values. Matlab6p5 version and VC6++ * Reference: MD5 in C by Tian-tai Huynh
des
- 数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述,它出自 IBM 的研究工作,并在 1997 年被美国政府正式采纳。它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,最初开发的 DES 是嵌入硬 件中的。-Data encryption algorithm (Data Encryption Algorithm, DEA) of the Data Encryption Sta
signature
- 根据从数据库中读取信息,之后通过CA进行公钥和私钥的分发,进行签名认证。 使用时进行验证签名。-According to information read from the database, followed by the CA public key and private key distribution, for signature verification. Used to verify signatures.