搜索资源列表
RSA_Prog
- rsa数字签名公钥加密私钥解密c++源代码-The C++ source program of RSA digital signature about encryption with public key and decryption with secret key.
公钥加密算法
- rsa加密解密是一种公钥加密算法,广泛应用于信息安全领域-rsa encryption and decryption is a public key encryption algorithm widely used in the field of information security
studentinfo
- 学生信息管理系统(JBuilder x 开发,采用RSA 512位公钥加密,私钥用于找回密码,2006-4-5)-student information management system (x JBuilder development, adoption 512 RSA public key encryption, the private key used to retrieve passwords 2006-2007-4- 5)
PKIDigitalCertificate
- 有关公钥基础设施数字证书的签名及认证。有详尽的注释,代码分发送者和接受者两部分。-the public key infrastructure digital certificate authentication and signatures. Details on the Notes, code-sender and the recipient of two parts.
RSA
- RSA公开密钥密码系统是由R.Rivest,A.Shamir,L.Adleman提出的,不仅仅可用于数据的加密,也可用于数字签名。本程序提供了RSA加密和解密过程实现的源代码。-RSA public key cryptosystem by R. Rivest, A. Shamir, L. Adleman raised, not only can be used for data encryption, digital signature
NET
- The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
SimplifyingPublicKeyManagement
- PKI(public key infrastructure) and CA(certificate authority)
RSA
- :RSA 是最广泛的公钥算法,从程序实现的主要思想、算法分析及流程说明、实验环境要求描述、运行 和结果、运行效率分析和程序源代码六方面介绍运用java程序实现RSA加密算法,要求输入明文的二进制位数 不少于1024。-: RSA public key is the most widely algorithm, from the process to achieve the main ideas, algorithms and p
java_encrypt_decrypt
- 1、利用公钥密码技术实现对称密码技术密钥的分配; 2、利用所分配的对称密钥对通信内容进行加/解密; -1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content o
RSA
- RSA算法是在1978年由Ron Rivest, AdiShamir 和Leonard Adleman提出的一种公钥加密算法。RSA能同时用于加密和数字签名的算法,也易于理解和操作。RSA是被广泛研究的公钥算法,从提出至今,经历了各种攻击的考验,逐渐为人们所接受,被普遍认为是目前最优秀的公钥方案之一。-RSA algorithm in 1978 by Ron Rivest, AdiShamir and Leonard Adleman p
ecp
- 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(p)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (p) the algor
ec2n
- 椭圆曲线公钥密码算法,可用于加密和数字签名等应用,该版本算法是有限域GF(2^n)上的算法-Elliptic curve public key cryptography algorithms can be used for encryption and digital signature applications, the version of the algorithm is a finite field GF (2 ^ n) the
public-key
- using public Decrypt and Encrypt message. just basic introduction how to dencrypt and decrypt.
SIP10
- 分析了会话发起协议及其特点,指出了SIP网络面临的一些典型攻击和安全威胁,并针 对SIP网络面临的安全风险提出了基于PKI公钥基础设施的SIP协议安全的解决方案,完善 了SIP的安全机制,使SIP能进一步为用户提供更加多样、安全的服务。-Analysis of the Session Initiation Protocol and its characteristics, pointing out that the SIP ne
RSA-public-key-cryptosystem
- RSA公钥密码体制的matlab实现,这是密码学的加密算法之一-RSA public-key cryptosystem implementation of matlab, Cryptography This is one of the encryption algorithm
ElGamal
- Implementation Of ELGAMAL Public key encryption in C . it can use very long key os size 2007 decimal digit.
public_key_algorithm
- this source code of public key-this is source code of public key
PGP
- PGP email protocol full functional using public key infrastructure and RSA technique.
DH
- Step 1: Generating a Parameter Set for the Diffie‐Hellman Key Agreement Algorithm Step 2: Generating a Secret Key Using the Diffie‐Hellman Key Agreement Algorithm Step 3: Use UDP to exchange DH public key Step 4: E
Public-key-infra-.tcl
- it is publickey infrastructure in wireless network, it generates a public key and a private key for mobile nodes-it is publickey infrastructure in wireless network, it generates a public key and a private key for mobile