-
详细的AESRSASHA1实现原理,其中RSA中内容自建的大书包。
详细的AESRSASHA1实现原理,其中RSA中内容自建的大书包。-Detailed AESRSASHA1 Principle, in which the contents of self-RSA big bags.
- 2023-08-30 02:35:03下载
- 积分:1
-
AES encryption algorithm of the VB implementation, both the string and file encr...
AES加密算法的VB实现,对字符串和文件都能加密。-AES encryption algorithm of the VB implementation, both the string and file encryption.
- 2022-02-20 19:28:10下载
- 积分:1
-
alternative Password Login Window (puzzles), the only correct map decorated resu...
另类密码登录窗体(拼图),只有正确拼出结果图才能进入。-alternative Password Login Window (puzzles), the only correct map decorated results can be admitted.
- 2022-02-06 08:14:21下载
- 积分:1
-
Are C functions in detail.
详细介绍了C函数。
- 2022-02-04 23:44:42下载
- 积分:1
-
IDEA symmetric algorithm software
IDEA对称算法的软件实现-IDEA symmetric algorithm software
- 2022-02-27 08:11:48下载
- 积分:1
-
encrpt
加密解决算法,有兴趣的可以瞧瞧,不太清楚如何使用-encrpt
- 2022-07-20 17:30:42下载
- 积分:1
-
DES/Triple DES IP Cores
Motivation
- A simple DES core
- Fast and Small Version
- Open Source
Compatibility
I believe that the core complies to NIST-800-17. However, there has been no formal third party verification. The official NIST specification can be downloaded here: 800-17.pdf. For the Triple DES, the NIST reference is located here:
- 2022-02-24 11:06:34下载
- 积分:1
-
AES IP core
While there are many AES cores around, this one is designed with LUT6 based FPGA architecture in mind from day one.
The AES Decryption Core for FPGA implements the decryption portion of the AES (a.k.a. Rijndael) algorithm described in the FIPS-197 specification. Key lengths of 128 / 192 / 256 bits are supported, each with a separate instantiation wrapper. Since the core is designed to take advantage of LUT6 based FPGA archit
- 2022-02-06 04:58:15下载
- 积分:1
-
使用DES3进行加密,包含全部delphi源代码!
使用DES3进行加密,包含全部delphi源代码!-DES3 use of encryption, including all delphi source code!
- 2022-06-30 05:24:08下载
- 积分:1
-
elgamal 签名
应用背景专注于满足安全问题结合RSA算法和对称密钥加密的基础上增强ElGamal算法数字签名方案。该方案是通过合并整数因子分解问题和离散对数问题。由于它提供了更好的计算速度和吞吐量比现有的rsa-elgamal算法。关键技术 ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ;及 ; ; ; ; ; ; ; ; ; ; ; ; ;提出的方案ElGamal型方案,使它的重点从原来的方案不同生成和加密解密过程。在这种技术中我们使用了两个单独的文件,用于加密文件和二签署消化消息。我们使用对称密钥加密增强ElGamal密码
- 2022-03-18 23:07:16下载
- 积分:1