搜索资源列表
Cryptanalysis-INCrypt32-of-iCLASS
- Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse
8524347
- :由于混沌系统对初始条件和混沌参数非常敏感以及生成的混沌序列具有非周期性 和伪随机性的特性,近年来混沌系统在密码学领域中得到了较多的研究。介绍了混沌学 理论和现代密码学的具体内容,通过对混沌和密码学之间关系的分析。提出了把混沌用 于密码学之中的具体方法和混沌密码系统的框架结构,给出了数字加密中选择混沌系统 的原则。-ecause of the chaotic system to initial conditions an
a-new-fast-stream-cipher--20110914
- A new fast stream cipher, MAJE4 is designed and developed with a variable key size of 128-bit or 256-bit. The randomness property of the stream cipher is analysed by using the statistical tests. The performance eva
-Elliptic
- We present elliptic curve cryptography (ECC) coprocessor, which is dual-field processor with projective coordinator. We have implemented architecture for scalar multiplication, which is key operation in elliptic cu
Public-key-Cryptography
- The mechanisms and methods of operation of public key encryption.
des
- this is belongs to cryptography
ebooksclub.org__Cryptography_and_Network_Security
- download a book in security Cryptography and Network Security Principles and Practice 5th_Edition useful book
des-rsa
- 密码学实验包括rsa和des的加密和解密破解,还有一份实验报告.-Cryptography experiments including rsa and des of encryption and decryption cracked, and a experiment report
RSA-DES
- 密码学 加密解密 RSA DES 能够实现简单的密码学功能-Cryptography encrypt, decrypt RSA DES can realize simple cryptography function
DES
- DES的加密解密算法的实现。附加实验报告。主要是对于应用密码学的实验-DES encrypt, decrypt the realization of the algorithm. Additional experiment report. Is mainly to application of cryptography experiment
Eurocrypt-2008
- 密码学国际顶级会议论文集,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
EUROCRYPT-2009
- 密码学国际顶级会议论文集,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
Eurocrypt-2010
- 密码学国际顶级会议论文集2010年,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
Eurocrypt-2011[1]
- 密码学国际顶级会议论文集2011年,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings2011years, cryptography researchers seeking valuable literature.
mimaxue-test1
- 密码学作业-古典密码体制的实践与分析,包括仿射密码,维吉尼亚密码,希尔密码和维吉尼亚和行置换的乘积密码体制 -Cryptography operations- the practice of classical cryptography and analysis, including affine password Virginia password, password, and Virginia Hill and replacemen
0401-2
- 椭圆曲线密码体制及其在电子银行中的应用,对椭圆曲线的加解密应用具有很好参考价值-Elliptic curve cryptography and its application in e-banking, a good reference value of the elliptic curve encryption and decryption application
0401-3
- 椭圆曲线密码算法及其应用论文,对椭圆曲线加解密算法实现具有很好参考价值-Elliptic curve cryptography algorithm and its application papers, the elliptic curve encryption and decryption algorithm to achieve a good reference value
040104
- 椭圆曲线密码算法的能量分析论文,对研究椭圆曲线加解密算法效率具有很高参考价值-Elliptic Curve Cryptography energy analysis paper, the study of elliptic curve encryption and decryption algorithm efficiency with high reference value
0401-5
- 椭圆曲线密码算法的快速实现研究论文,对椭圆曲线加解密算法的实现具有很高参考价值-Elliptic Curve Cryptography quick research papers, and realization of the elliptic curve encryption and decryption algorithm has high reference value
crypto-RCJ-_1
- ppt on cryptography. Branch of maths that investigates secret code theory and methods. Two branches: -ppt on cryptography. Branch of maths that investigates secret code theory and methods. Two branches: