搜索资源列表

  1. thexcs_src

    0下载:
  2. Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现! -Tig
  3. 所属分类:加密解密

    • 发布日期:2008-10-13
    • 文件大小:46.88kb
    • 提供者:成东
  1. thexcs_src

    0下载:
  2. Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET. Tiger Tree Hash算法的C#实现! -Tig
  3. 所属分类:加密解密

    • 发布日期:2024-11-26
    • 文件大小:47kb
    • 提供者:成东
  1. snefru

    0下载:
  2. Snefru is a cryptographic hash function invented by Ralph Merkle which supports 128-bit and 256-bit output.
  3. 所属分类:加密解密

    • 发布日期:2024-11-26
    • 文件大小:37kb
    • 提供者:Silver Egg
  1. rfc1321

    0下载:
  2. The MD5 Message-Digest Algorithm Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Ack
  3. 所属分类:加密解密

    • 发布日期:2024-11-26
    • 文件大小:10kb
    • 提供者:Leo
  1. MHjava

    0下载:
  2. Merkle-Hellman knapsack cryptosystem.
  3. 所属分类:JSP源码/Java

    • 发布日期:2024-11-26
    • 文件大小:7kb
    • 提供者:arei
  1. MHknapsack

    0下载:
  2. Merkle-Hellman knapsack cryptosystem
  3. 所属分类:JSP源码/Java

    • 发布日期:2024-11-26
    • 文件大小:2kb
    • 提供者:arei
  1. merkle-hellman02

    0下载:
  2. ASCII明文背包加密算法,按照书上的例子自己写的-ASCII plaintext encryption algorithm knapsack
  3. 所属分类:C#编程

    • 发布日期:2024-11-26
    • 文件大小:47kb
    • 提供者:leekey
  1. MerkleHellman

    0下载:
  2. The encryption algorithm using Merkle-Hellman knapsacks starts with a binary message. * The message is envisioned as a binary sequence P = [p1, p2, … ,pk]. * Divide the message into blocks of m bits, Po = [P1,
  3. 所属分类:CA认证

    • 发布日期:2024-11-26
    • 文件大小:66kb
    • 提供者:tamer
  1. Preventing-Method-Of-Wormhole-Attack

    0下载:
  2. we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey
  3. 所属分类:行业发展研究

    • 发布日期:2024-11-26
    • 文件大小:171kb
    • 提供者:manthan
  1. bin V31.20.47d

    0下载:
  2. Merkle Me rkleM erkle MerkleM erk le MerkleM erkl eMer kle
  3. 所属分类:其他小程序

    • 发布日期:2024-11-26
    • 文件大小:12.02mb
    • 提供者:ajtus
  1. Bootloader2 Update auf V0.01.14

    0下载:
  2. Merkle merkel mERKLE
  3. 所属分类:其他小程序

    • 发布日期:2024-11-26
    • 文件大小:1.38mb
    • 提供者:ajtus

源码中国 www.ymcn.org