资源列表

« 1 2 ... .24 .25 .26 .27 .28 229.30 .31 .32 »

[CA认证1

说明:实现RSA算法。并对 I LOVE NANJING UNIVERSITY OF AERONAUTICS AND ASTRONAUTICS 加解密。说明:为了方便实现,分组可以小一点,比如两个字母一组。-Implement the RSA algorithm. And " I LOVE NANJING UNIVERSITY OF AERONAUTICS AND ASTRONAUTICS" encryption and d
<查航> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证yiweijicunqi

说明:1)利用C\C++语言实现给定的LFSR; 2)通过不同初始状态生成相应的序列,并观察它们的周期有什么特点; 3)利用生成的序列对文本进行加/解密 -1) using the C \ C++ language given LFSR 2) to generate the corresponding sequences different initial state, and observe what are the char
<查航> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证md5

说明:通过实现数字签名算法(DSA),加深对数字签名算法的理解,同时学习Hash算法的实现。 1)利用C\C++语言实现DSA算法。 2)DSA中的Hash函数采用SHA算法。 -By implementing the Digital Signature Algorithm (DSA), a better understanding of the digital signature algorithm, while learnin
<查航> 在 2024-05-21 上传 | 大小:3072 | 下载:1

[CA认证prob3

说明:Miller-Rabin test is a primality test algorithm which determines whether a given number is prime or not. Implement Miller-Rabin primality test as given in the text book page 257, Algorithm 7.44. (aN− 1 6= 1 mod
<jitender grover> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证4

说明:Cryptographic Hash Functions: A cryptographic hash function must have at least two security properties: collision free and Hiding. Collision free property ensures that for a given function H, no one can find x and y
<jitender grover> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证discrete_log

说明:Solve descrete log problem using meet in the middle attack. More formally, write a program to compute discrete log modulo a prime p. Let g be some element in Z p and suppose you are given h in Z p such that h = gx
<jitender grover> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证diffie_hellman

说明:Implement Diffie-Hellman Key exchange protocol and demonstrate that at the end, both person will have a common Key. Do the following: 1. Set a variable p ( e.g. p = 37) and g (e.g. g = 5). 2. Generate a, a random
<jitender grover> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证q1

说明:Consider an organization with three roles: A, B and C. Whenever B has to issue some instruction to A, B has to take permission via C and then only it will be obeyed by A. This permission is issued with the help of a
<jitender grover> 在 2024-05-21 上传 | 大小:1024 | 下载:0

[CA认证mbedtls-2.4.0-apache

说明:mbed-tls加密库源码,arm收购自polarssl-Mbed-tls encrypt library source code, polarssl has been sold to ARM and renamed.
<zyb> 在 2024-05-21 上传 | 大小:1913856 | 下载:0

[CA认证des.tar

说明:THE ALGORITHM WRITTEN IN C FOR BOTH ENCRYPTION AND DESCRYPTION AND CAN BE USED AS SINGLE MODULE FOR 3- des ALGORITHM
<jospeh> 在 2024-05-21 上传 | 大小:4096 | 下载:0

[CA认证Hill-Cipher

说明:Encryption algorithm of Hill cipher with GUI in c#
<Hasnain> 在 2024-05-21 上传 | 大小:49152 | 下载:0

[CA认证AES-Assignment-1.3

说明:AES algorithm implementation in c# with GUI
<Muhammad Hasnain> 在 2024-05-21 上传 | 大小:54272 | 下载:0
« 1 2 ... .24 .25 .26 .27 .28 229.30 .31 .32 »

源码中国 www.ymcn.org