资源列表
2014-09-04现代密码学
- 密码学入门,介绍古典密码学以及现代密码学的相关知识,密码学博大精深,愿与大家一起努力。(it is about introduction of file.)
MD5-PKI
- md5算法和PKI认证,通过C++来实现,为信息安全专业的实训内容-md5 algorithm, and PKI authentication, through C++ to achieve, for the information security professional training content
Server-U
- 最小巧的Serv-U,十分适合局域网和web站点使用,设置十分简单。-The most compact Serv-U, is very suitable for LAN and web sites use, very easy to set.
zhuceji
- 注册机是为了维护软件所有者的权益而开发出来的一套软件,只有开发者给用户密码,用户才可以使用软件。从而保护了开发者的权益。此程序在VC6.0上开发-RI is developed in order to safeguard the interests of the software owner and a set of software, the only developer to the user' s password, the user can use the software. To
Register
- 基于RSA算法的软件注册和加密保护,其中RSA是1024位,先提取硬盘系列号进行加密,然后生成注册码。对收到的注册码进行核对-RSA algorithm is based on registration and encryption software, which RSA is 1024 bits, the first extraction encrypts hard drive serial number and then build License. Received the registr
TestMd5
- C++实现OpenSSL完成MD5加密,可C# 调用Done in C++ OpenSSL MD5 encryption, you can call C#Done in C ++ OpenSSL MD5 encryption, you can call C#-Done in C++ OpenSSL MD5 encryption, you can call C#
TpLinkPass
- C++写的路由器弱口令猜解工具,(字典文件太大不放了)抛砖引玉吧-Written in C++ router weak password guessing tools (dictionary file is too big hold up) puts it
密码学原理与实践第二版
- a document that explains many classic crypt_decrypt algorithms
Alcohol52cn
- 用于RSA加密解密 签名和验证签名,对初学者很有帮助!非常好的一个软件,可以验证自己的程序!-RSA encryption and decryption for the signature and verify signature, very helpful for beginners! A very good software that can verify its own procedures!
AC
- 算術編碼作業可快速加密,並可以讓使用者快速解密-Arithmetic coding operation can be quickly encrypted and allows users to quickly decrypt
DES_C-language
- C语言实现的DES代码,可以直接编译运行。加密10M文件时间大约16到20秒。注释详细。其中工程名AES是手误打错了,实际上是DES算法的实现代码。-C language implementation of the DES code can be directly compiled to run. 10M file encryption for about 16-20 seconds. Detailed notes. Which works were wrong hands AES is wro
DES4
- DES加密、解密程序,有界面,MFC,有每一步的子密钥生成过程显示,以及中间步骤,适合进行演示。-DES encryption and decryption procedures, interface, MFC, there every step of the sub-key generation process display, as well as intermediate steps, suitable for presentation.