搜索资源列表
-
0下载:
自己写的java版的加密解密网络算法应用。有对称,非对称,数字签名,等应用-himself wrote the java version of the network encryption and decryption algorithm application. A symmetric, asymmetric, digital signature, and other applications
-
-
0下载:
Shamir秘密分享算法的java实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Applicati
-
-
1下载:
Shamir秘密分享算法的C#实现,主要是使用平面上k点可以决定k-1次方的多项式,以k点为门槛值,应用Lagrange多项式插入方法的技术,回复原多项式,再求出主密钥。-Shamir secret sharing algorithm to achieve the java, is the use of the plane could be decided k k-1 power of the polynomial, a k-value of the threshold, Application
-
-
0下载:
Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg (key + permutation of elements)-Java Application for testing Encryption/Decryption of several algorithms: Ceaar, Vigenere, a custom make alg
-
-
0下载:
MD5加密摘要算法源码(Java版)
MD5的典型应用是对一段信息(Message)产生信息摘要(Message-Digest),以防止被篡改-Summary of MD5 encryption algorithm source code (Java version) MD5 is a typical application of the information (Message) message digest generated (Message-Digest), to prevent t
-
-
0下载:
实现骑士游历问题。 骑士游历问题是一个经典的数学问题。其思想在电路图的设计及图像加密等方面都有帮助,如果能将骑士游历问题算法通过计算机语言程序化将对其在其他领域中的应用有极大帮助。通过研究骑士游历的规则对问题进行数学模型抽象,通过研究骑士游历的方向与可到达情况,将骑士的空间移动抽象成数学表达式,进而映射到程序中所需对应的数据结构形式,最后通过利用JAVA语言得以实现骑士游历问题中骑士游历过程的动态图形演示。 -Knight traveled to achieve the problem. Kni
-
-
0下载:
利用java.security对字符串进行加密解密,包含应用实例。-Use Java. Security in a encrypt, decrypt, including the application example.
-