资源列表
cesare
- Cryptographic substitution Algorithm written in java
DES
- 关于java的加密,不是很完全,不要介意-about java
1983_Algorithms_Robert-Sedgewick
- 1983 Algorithms Robert Sedgewick
libtomcrypt-0.96
- 密码学中常用的密码库函数!有助于密码学的研究!-Cryptography library functions commonly used in the password!
TranspositionCipher
- cipher message in transportation method by c# language
projeect
- SDES implementation in matlab
HillCipher_LinearAlgebra_Project
- implementation of Hill cipher algorithm in matlab
8-Mina_Mishra
- This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing
20090603
- Abstract Developing technologies in the field of network security. The main motive of this paper to instigate the fast developing cryptography researchers and to increase the security development in the field of information security. In this
SHA1_VC
- SHA1, 常用的SHA1,用于数字签名等-sha1,common sha1,userd for ca
FDA21-CFR11
- Guidance for Industry Part 11, Electronic Records Electronic Signatures — Scope and Application
base64
- Base64加密和解密的开源代码,可直接加入工程进行操作-Base64 encryption and decryption of open source code can be added directly operate the works
