资源列表
Hill
- Hill Algorithm This system is based on linear algebra and has been important in the history of cryptography. It was invented by Lester S. Hill in 1929, and was the first polyalphabetic cryptographic system that was convenient to work with more than
crypt
- Crypto library on C sha aes etc
200611919209267
- 主要是对文件的一些操作:加密、解密文件,加密、解密可运行文件,批量更名,文件比较,文件分割 -Document some of the main operations: encryption, decryption file, encryption, decryption can run the file, batch rename, file compare, file split
10.1.1.1.5181
- 一个智能卡加密的好文章,详细记述了一个加强的智能卡加密算法的实现-Abstract – Hwang and Li proposed the first remote user authentication scheme using smart cards to solve the problems of Lamport scheme. Unfortunately, Hwang and Li’s scheme has some security weaknesses. First, C
AES
- hidhsifnkdsf dsf kds fd f
Cezario_algoritmas
- Ceasar crypt/decrypt string algorithm written in C-Ceasar crypt/decrypt string algorithm written in C++
pe_decoder
- 在《软件加密技术》这本书里看过PE文件各部分的详细解释之后,我也有了一个自己写PE文件分析器的的想法。虽然好的分析器不在少数,但对于一堆十六进制数,有些朋友可能不明白它代表什么意思。如果在程序里就可以将这些01序列转换成可以直接看懂得信息,那至少用户可以省去以后去查表的麻烦。怀着这样的想法,我仔细的研究了书中分析器PEInfo的源代码,我发现它没有提供信息转换的功能。 通过研究发现,PEInfo是通过PE文件在内存中的映象来获取文件信息的,我在想是否还有别的方法可以绕过将文件映象到内
testLinearattack_20160603
- Linear attack for SPN
liu_shengying_jiajiemi
- 利用liu系统的自同步混沌信号,对数字音频信号进行加解密-Liu systems use self-synchronization of chaotic signals, the digital audio signal encryption and decryption
advanced.text.encryption.decryption.algorithm.code
- 文本加密解密算法开发高级代码Development of advanced text encryption and decryption algorithm code -Development of advanced text encryption and decryption algorithm code
AES
- Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into per
pkcs-1v2-1
- PKCS #1 v2.1: RSA Cryptography Standard
