搜索资源列表
-
0下载:
本人基于William Stalling的《密码学与网络安全》实现的128位DES加密算法-William Stalling on "Cryptography and Network Security" Achieving 128 - DES encryption algorithm
-
-
1下载:
加密作业,des分组模式中的CFB模式,根据《密码编码学和网络安全》一书-encryption operations, a mode des CFB mode, "Cryptography learn and network security," a book
-
-
0下载:
Crypto++是一个非常强大的密码学库,主要是功能全,统一性好,基本上密码学中需要的主要功能都可以在里面找得到。Crypto++是由标准的C++写成的,学习C++、密码学、网络安全都可以通过阅读Crypto++的源代码得到启发和提高。-Crypto is a very powerful cryptography library, the main function of the whole, good uniformity basically cryptography needs of the
-
-
0下载:
this program deals with the RSA algorithm in details,which is a study topic in the master s degree of many students in cryptography and network security subject.-this program deals with the RSA algorithm in details,which is a study topic in the mast
-
-
1下载:
《密码学与网络安全》 第四版 的习题解答,英文版-Cryptography and Network Security to answer the fourth edition of the exercise
-
-
0下载:
Cryptography and Network Security, 4th Ed.-Stallings ebook. free to download
-
-
2下载:
密码编码学宇网络安全的答案
密码编码学宇网络安全的答案-answer for Cryptography and Network Security
-
-
0下载:
Cryptography and network security
-
-
0下载:
This paper presents the design and
implementation of a crypto processor, a special-purpose
microprocessor optimized for the execution of
cryptography algorithms. This crypto processor can be used
for various security applications such as stor
-
-
0下载:
密码学与网络安全技术基础,汤惟主编,做这方面的人可以参考一下-Cryptography and network security technology , edited by TangWei, so you can refer to that
-
-
0下载:
Cryptography And Network Security 4th Edition 05
-
-
0下载:
Workload Characterization of
Elliptic Curve Cryptography and other
Network Security Algorithms for
Constrained Environments
-
-
0下载:
This literature review glances at the research that has been published in the area of chaos cryptography along with
cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the
designing
-
-
0下载:
Abstract
Developing technologies in the field of network security. The
main motive of this paper to instigate the fast developing
cryptography researchers and to increase the security
development in the field of information security. In this
-
-
0下载:
download a book in security
Cryptography and Network Security Principles and Practice 5th_Edition
useful book
-
-
0下载:
Presentation on network security and cryptography
-
-
0下载:
“Cryptography and network security”书中计算信中字母频率的算法。-" Cryptography and network security" the letter frequency algorithm in the calculation of the letter in the book.
-
-
2下载:
用C/C++实现加解密算法及其应用:DES(或AES)和基于DES(或AES)的CMAC。-With C/C++ achieve encryption and decryption algorithm and its application: DES (or AES) and based on DES (or AES) of CMAC.
-
-
0下载:
A powerpoint presentation of network security and cryptography.
-
-
0下载:
MD5算法,应用于网络安全,密码学方面的知识,加密解密算法,自己写的,仅供参考-MD5 algorithm used in network security, knowledge of cryptography, encryption and decryption algorithms, wrote it myself, for reference only
-