登录
首页 » Java » GMCA

GMCA

于 2020-06-22 发布
0 227
下载积分: 1 下载次数: 4

代码说明:

说明:  SM2 SM3 X.509 国密 证书 国密算法 国密证书 生成签发 相关代码 包含sm2国密算法密钥生成,证书请求生成,数字证书生成,sm3withsm2国密数字签名示例(SM2 SM3 X.509 Secret Certificate Secret Algorithms Secret Certificate Generation and Issuance of Related Codes Including SM2 encryption algorithm key generation, certificate request generation, digital certificate generation, sm3withsm2 encryption digital signature example)

文件列表:

GMCA-master, 0 , 2019-04-09
GMCA-master\README.md, 804 , 2019-04-09
GMCA-master\pom.xml, 665 , 2019-04-09
GMCA-master\src, 0 , 2019-04-09
GMCA-master\src\main, 0 , 2019-04-09
GMCA-master\src\main\java, 0 , 2019-04-09
GMCA-master\src\main\java\GMCA.java, 11654 , 2019-04-09
GMCA-master\src\main\java\GMCertReq.java, 2020 , 2019-04-09

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 腾讯2016研发工程师笔试真题一
    腾讯2016年研发岗笔试真题,含部分题目答案。(The design pattern of the big talk series is very vivid and easy to understand.)
    2018-03-08 16:24:58下载
    积分:1
  • m
    说明:  sh-1的加密解密算法的实现,有相关文件和代码(sh-1 encryption and decryption algorithm, related documents and code)
    2013-07-31 14:35:32下载
    积分:1
  • security
    说明:  说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现   利用数字信封实现大文件的加密、解密。 2、有什么用:   2.1 研究、学习信息安全中的密码学设计与实现技术。   2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。(Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for)
    2006-03-23 17:38:00下载
    积分:1
  • safetyManagement
    运用典型的ssh2框架,具有上传文件,加解密,数字签名和身份认证等功能(Use ssh2 typical framework, with the uploaded file encryption and decryption, digital signature and authentication functions)
    2012-06-17 15:47:30下载
    积分:1
  • MD5COM
    MD5加密算法的COM控件以及编译的源码(MD5 encryption algorithm to compile the COM controls, as well as the source)
    2008-12-12 11:15:08下载
    积分:1
  • rsa2
    code of encryption rsa with matlab
    2009-04-08 05:20:14下载
    积分:1
  • Digital
    数字密写与密写技术 F5的Matlab源程序(Digital Steganography Steganography technology and F5 s Matlab source code)
    2009-12-26 15:12:06下载
    积分:1
  • Lyapunov-exponent-curve-of-logistic
    包含了产生逻辑斯蒂映射的代码,以及绘制了逻辑斯蒂映射的分岔图以及李雅普诺夫指数的图像,还有程序运行结果的图像.李雅普诺夫指数在研究动力系统的分岔、混沌运动特征中起着重要的作用,,李雅普诺夫指数大于0,处于混沌状态. (The logistic map contains the code, and draw the image bifurcation diagram of logistic map and Lyapunov exponent, image and program results. The Lyapunov exponent in the study of power system bifurcation and chaotic motion characteristics plays an important role, the Lee Yap Andrianof index is greater than 0, is in a chaotic state.)
    2017-03-03 11:00:48下载
    积分:1
  • MyDES
    Chiper DES, Full Functions
    2009-06-03 23:34:44下载
    积分:1
  • Matriz
    Encriptar archivos, encriptar, encriptar
    2013-02-13 04:19:17下载
    积分:1
  • 696518资源总数
  • 106164会员总数
  • 18今日下载