搜索资源列表
itvl14
- base paper of vl14.cryptography paper and it uses sms4 concept.
926281-An-Introduction-to-Cryptography-for-NonCry
- An-Introduction-to-Cryptography-for-Non Cryptographers-With-Mathematical-Background
Cryptography
- Lecture notes on Cryptography
CryptographyAndNetworkSecurity4ThEd
- Cryptography and Network Security-4th Edition-Prentice Hall-2005
qw
- It has been proved that network coding can be used to improve the throughput for multicast t ransmission , but such systems are very vulnerable to contamination at tack , and the signatures for t raditional network are no longer suitable for net
we
- It has been proved that network coding can be used to improve the throughput for multicast t ransmission , but such systems are very vulnerable to contamination at tack , and the signatures for t raditional network are no longer suitable for net
chaos
- this file envolves many document discribing the logistic map used in chaotic cryptography
Introduction-to-Cryptography--Principles-and-Appl
- cryptogrphy book end to end encryption
QCandSKD-introduction
- 本文讲述了量子密码的基本理论知识,通俗易懂-This article describes the basic theory of quantum cryptography knowledge, easy to understand
Cryptography
- Its is ryptography fundamental concept
VisualCryptography(shamir)
- Visual Cryptography Moni Naor and Adi Shamir
JAK
- In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But appr
New-Microsoft-Office-Word-Document
- With the fast development of the computer technology and information processing technology, the problem of information security is becoming more and more important. Information hiding is usually used to protect the important information from disclosi
CNS-2
- IT CONTAINS CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMS
Guide_to_Elliptic_Curve_Cryptography
- Describe for ECC(Elip curve cryptography)
Establishing-Pairwise-Keys-in-Distributed-Sensor.
- Establishing Pairwise Keys in Distributed Sensor Networks DONGGANG LIU, PENG NING and RONGFANG LI North Carolina State University Pairwise key establishment is a fundamental security service in sensor networks it enables sensor nodes to com
Cryptography
- 哈工程国家保密学院现代密码学课件——付小晶。-Harbin Engineering University College of the State Secrets cryptography Courseware.
Introduction-to-Quantum-Cryptography
- Quantum cryptography is a scientific discipline that exploits the laws of quantum mechanics to perform cryptographic tasks, e.g., secure message transmission. It turns out that quantum phenomena are in fact very useful for that purpose: The level
Parameter-evaluation-of-various-cryptography-tech
- In this document cryptography is discussed. some information in being sent in form of codes known as encryption and at the receiver side decryption is done to recover the information.
Elliptic-Curve-Cryptography
- Elliptic Curve Cryptography的技術文件說明檔-Elliptic Curve Cryptography Technical Document File