CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 系统编程 CA认证 搜索资源 - java IT

搜索资源列表

  1. PlayfairCipher_codes

    0下载:
  2. Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854
  3. 所属分类:CA program

    • 发布日期:2017-04-03
    • 文件大小:132927
    • 提供者:黃文岩
  1. ejbca_3_9_3

    0下载:
  2. EJBCA是一个完整功能的证书认证程序,完全用 Java编写,使用J2EE(Java2 Enterprise Edition, Java2企业版)技术。它建造在J2EE平台之上,是一个开放的、健壮的、高性能的、平台独立的、灵活的和基于组件的CA,可以被单独使用或集成到其它J2EE应用程序中,并且它还提供了一个灵活强大的基于 Web的用户图形界面。由于它实现了WPKI中的几乎所有重要的部件,比如RA (Registration Authority,注册中心), CA(Certification A
  3. 所属分类:CA program

    • 发布日期:2017-11-09
    • 文件大小:47990193
    • 提供者:刘东亚
  1. simpleecdsa-1.0.0.tar

    0下载:
  2. it s about authentication msg using ECDSA
  3. 所属分类:CA program

  1. RSAjava

    0下载:
  2. RSA four letter encryption written in Java just set your public and private keys and with the public key it encrypts four letters into five letters then with the five letter and your private key you decrypt the message into the original four letters
  3. 所属分类:CA program

    • 发布日期:2017-04-04
    • 文件大小:1466
    • 提供者:Derek
  1. RSA

    0下载:
  2. This implementation of popular RSA algorithm for encryption and decryption in java. It can be run on client server architecture-This is implementation of popular RSA algorithm for encryption and decryption in java. It can be run on client server arch
  3. 所属分类:CA program

    • 发布日期:2017-04-24
    • 文件大小:43553
    • 提供者:Kaustubh Lohiya
  1. Fermat

    0下载:
  2. Fermats test to check for primality. Code is in java. takes a e=random number and gives whether it is prime or not.
  3. 所属分类:CA program

    • 发布日期:2017-11-07
    • 文件大小:673
    • 提供者:kodaman
  1. MD5

    0下载:
  2. This a java code for MD5 encryption algorithm. MD5 is an algorithm which helps you in generating hash codes for securing your data. It s a kind of digital signature used in networks.
  3. 所属分类:CA program

  1. Yush.java.tar

    0下载:
  2. This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII c
  3. 所属分类:CA program

    • 发布日期:2017-04-12
    • 文件大小:878
    • 提供者:Aman Virmani
搜珍网 www.dssz.com