搜索资源列表
Encryption_Fundamentals
- this little chapter describe the usage of Encryption methods. author : Hugo Fruehauf I HOPE YOU CAN FIND IT NICE AND GOOD. THANKS A LOT JEMO
AESSTANDARD
- Advanced Encryption Standard
DES_report1
- The Data Encryption Standard (DES) is a published federal encryption standard created to protect unclassified computer data and communications. The DES algorithm is the most widely used encryption algorithm in the world
hj
- 宏杰工具之文件夹加密V2068简体中文绿色特别版-Hongjie folder encryption tool V2068 Simplified Chinese Green Special Edition
jiajiemi
- 简单的加解密,输入一段明文,通过加密程序得到密文,在通过解密程序解密得到明文-Simple encryption and decryption, enter a section of an express, through encrypted ciphertext procedures, through the decryption process at decryption been expressly
DES
- DES的每个分组是64位,既明文和密钥都是64位(密钥实际用56位,每字节第8位为校验)。这个算法的核心是Feistel密码,由于其设计的巧妙,加密解密都用一个函数,具体原理请查阅其他资料。DES的流程基本是执行16轮下面的运算:-DES each packet is 64, both explicit and are 64-bit key (actual key 56, the first 8 bytes each for validation). The core of this algor
gongyao
- RSA也可以用来为一个消息署名。假如甲想给乙传递一个署名的消息的话,那么她可以为她的消息计算一个散列值,然后用她的密钥加密这个散列值并将这个“署名”加在消息的后面。这个消息只有用她的公钥才能被解密。乙获得这个消息后可以用甲的公钥解密这个散列值,然后将这个数据与他自己为这个消息计算的散列值相比较。假如两者相符的话,那么他就可以知道发信人持有甲的密钥,以及这个消息在传播路径上没有被篡改过。-RSA can also be used as a signed message. If i want to
3.8
- 加密解密技巧,DES,AES, RAS等算法。Java代码可以在EDI中运行实现。-This is a documentation for encryption and decryption.
QuantumCryptography
- about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
Rabin-Miller
- RSA的最重要特色在于双密钥,它们有特殊的数学形式。RSA的一对密钥有三个基本参数:模n ,公钥b和私钥a 。n和b是公开的,发送信息方用私钥n加密消息,接受方用公钥b能得到解密后的信息,从而确定发送信息方的身份,这就构成了签名机制。对方用公钥将要发送的信息加密,只有拥有私钥的一方才能将信息解密。-RSA is the most important feature of dual-key, they have a special mathematical form. RSA keys of a
482647software
- 详细介绍软件加密解密的知识,对于研究软件脱壳解密的朋友应该有一定帮助-Detailed knowledge of encryption and decryption software, the study of shell decryption software should have some friends help
UsingClanguagetoachievethechaoticencryptionpasswor
- 口令是人们在网络中的身份认证,一旦被攻击者破译,私人资料将被泄露。该文基于混沌理论针对口令加 密提出了一种新的算法,并利用C++ 语言对算法进行了模拟-Password is in the network authentication, once an attacker to decipher, the private information will be leaked. The password based on chaos theory for a new encryption alg
MD5
- 加密的一段代码 我也不是很会用这个 高手自己研究把-Encryption code is, I do not use this study to master their own
DES.tar
- its easy to make an encryption
AES
- Rijndael加密算法是分组长度可变的分组密码。分组长度,密钥长度可以为128,192,256比特。 假设加密的中间结果为状态State。状态State可以用类似于元素为一字节的矩阵来表示,矩阵的行数为4,列数为Nb,Nb等于分组长度除以32。 -Rijndael encryption algorithm is the grouping variable length block cipher. Packet length, key length for the bit 128,192
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
mir2CMD
- 把传奇的加密代码还原成可读懂的,用于研究传奇2的各种操作命令和数据传送原理-The legend to restore the encryption code can be read and used to study a variety of legendary 2 command and data transfer operation principle
PEHdDistortion
- 可执行文件头的变形技术。常用于加密和破解。-Executable file of the deformation head. Commonly used in the encryption and crack.
124
- A Chaotic Algorithm of Image Encryption Based on Dispersion Sampling
KEYGEN.VBP
- 提供序列号,为文件加密提供方便,其中算法较新-Provide the serial number for file encryption to provide convenient, which algorithm is better than the new