搜索资源列表
EbookCAppliedCryptographySecondEditionProtocolsBr
- applied cryptography ebook by bruce scheneier
test
- 古典密码学若干算法 (1) 实现移位密码; (2) 实现替换密码; (3) 实现Vigenere密码(选做); (4) 实现置换密码(换位密码); (5) 对每一种密码,编写加密字符串和加密文件的两种算法并进行实验。 -A number of classical cryptography algorithm (1) the realization of shift cipher (2) to achieve the replacement of the password
Solutions-Crypto4e
- 《密码学与网络安全》 第四版 的习题解答,英文版-Cryptography and Network Security to answer the fourth edition of the exercise
criptografia_visual
- this a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Naor, Adi Shamir. -this is a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Na
Cryptography
- 密码学的教程,很多精妙的算法和各种方法,很好的学习教程-Cryptography Tutorial, many sophisticated algorithms and a variety of methods, good learning tutorial
cryptology
- 密码学第三版课件,包含4大部分,传统密码学以及对称加密,公钥加密等-The third edition of courseware cryptography
ECC
- eliptic curve cryptography decryption
cryptography
- Cryptography algorithm
J2me-AES
- [cryptography] AES encrypt and decrypt for j2me,
Cryptography
- Cryptography in MATLAB
idea
- encryption algorithm, IDEA, symmetric key cryptography algorithm used in internet widly
answer_for_Cryptography_and_Network_Security
- 密码编码学宇网络安全的答案 密码编码学宇网络安全的答案-answer for Cryptography and Network Security
introductiontomoderncryptography
- 一本介绍密码学现代知识的学习资料,对于密码算法编程方面很有用。-A descr iption of the study of modern knowledge of cryptography information programming for the cryptographic algorithm is useful.
cryptography
- 使用DES解密和加密文件,供JAVA爱好者交流和学习-The use of DES decryption and encryption documents for sharing and learning JAVA lovers
main
- poj2109:Power of Cryptography.贪心算法.正确程序.-poj2109:Power of Cryptography.Greedy algorithm.accepted program.
Playfair
- 最近在学密码学,这一个实现playfair加密算法的java类,主要包括构造函数、加密函数和解密函数,还有几个辅助函数,附有测试类,在控制台下运行的。-A recent study of cryptography, which playfair encryption algorithm to achieve a java class, mainly including constructor, encryption and decryption function, a function, and
good_galois_all_operations
- Galois field is used in ECC( elliptic curve cryptography). This is a brief introdustion about the prime field and its related concepts
Visual_Cryptography
- In this IEEE Paper "Visual Cryptography is Solved" in c and MATLAB-In this IEEE Paper "Visual Cryptography is Solved" in c and MATLAB
introduction-to-cryptology.pdf
- Introduction to cryptology. This presentation provides and overview of cryptography and how it fits within the framework of network security.
cryptography
- 字母频率统计:包括1维与二维字母出现频率与总数-Letter frequency statistics include: 1-dimensional and two-dimensional frequency and the total number of letters