搜索资源列表
OpenCA-0.8.1.tar.gz
- Perl写的CA认证程序,用到了OpenSSL
ptptl-0.2.tar.gz
- 一个用于点对点传输加密的工具包源码,使用了CA
RSAeuroi-102
- RSA算法函数库RSAEUROI 102-RSA algorithm library RSAEUROI 102
ideapgp.rar
- idea 算法 c、c++实现 真的不错啊,idea algorithms c, c++ to achieve really good ah
pkcs11-helper-1.06.rar
- 国外的一个用于使用和测试PKCS#11的代码,对使用PKCS#11和测试人员都有很大帮助,Abroad for the use of a PKCS# 11 and test the code, the use of PKCS# 11 and test personnel are very helpful
minidwep
- minidwep-gtk,一个aircrack-ng的图形前端gui, 全中文,比spoonwep好用 [attach]95802[/attach] 遵守规定,点确定 [attach]95803[/attach] 看看 左边有没有你的网卡,如果没有,说明软件不支持 你的 ... 想要的东西出来了 -minidwep-gtk, a graphical front-end aircrack-ng gui, all Chinese, easy to use than sp
gnupg-2.0.18
- GNUPG source code, it has encryption and decryption functions that could be reused
decaptcher_perl_addon
- Useful for OCR decaptcha
ComprLib
- Compression library open source aPLIB JCALG1 LZMA
issl
- iSSL是小型的加密API,使用方法和AES加密的RSA建立SSL的一样,安全的加密两端之间的沟通交流,通过一个网络接口,包括会议密钥的生成和公共密钥交换。-iSSL small encryption API to use RSA and AES encryption to establish the SSL security encryption between the two ends of communication, through a network interface, includ
compression
- python压缩数据,短小精悍,快速 真真的不错-the python compressed data, dapper, quick Barbara good
rsatool
- Rsacrack testing version for windows or linux
RSAEuro-1.04.tar
- RSA等各种加密算法c代码.内部还包含符合386汇编码-RSA encryption algorithm c code. Interior also contains assembly code in line 386
Crc16.py
- CRC 16 bits em python
Crc24
- CRC 24 code python for calculate result
AES0912
- 对文档进行AES加密、解密,加密后进行解密,可以通过对比加密解密后的文档与原文档的区别判断程序运行是否正常-AES encryption/decryption
PicCoders
- Programm that could hide picture into picture by using methods of steganography
cert-issuer-master
- 麻省理工大学,关于区块链的研究,用于毕业证书上-mit bitcoin
prob3
- Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod N) Write three functions to
4
- Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y such that H(x) = H(y). The hid